Analysis

  • max time kernel
    200s
  • max time network
    191s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    18/09/2022, 22:17

General

  • Target

    5436cfae7e0df48277308149b41617bc56377f6a742e937a102ff0d106a03090.html

  • Size

    6KB

  • MD5

    3588e997b81d43a9de7eeda3a5137b32

  • SHA1

    b0557ff1197d5f2e238d74d3456ebd70ed1ab19c

  • SHA256

    5436cfae7e0df48277308149b41617bc56377f6a742e937a102ff0d106a03090

  • SHA512

    b480f2e5b526f5e16adc7de12b51d1935738a9471465d284f09d6d153cef712ef9baa5ef4a22a9fed2c9aafa0f3d3bee9b9e0ecdf3877aa0c7e173dc7c7d4425

  • SSDEEP

    192:ICgUXmXbXqW0N0v0CaBz0wY8yr/kf2jRnQ5/e:IIIr/kG

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5436cfae7e0df48277308149b41617bc56377f6a742e937a102ff0d106a03090.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1248
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1248 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1512

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    340B

    MD5

    49252ffff761e83d4ef068c05ef2c9ef

    SHA1

    8242f53ee774c4ae28b5873a2c71d74e9799ad3d

    SHA256

    7f0ba09bb9afafc9462f7c5cc83fec4c2bcd89ba7043c4da826a6127689f630e

    SHA512

    81cd950c31a1aa3bbbb5f764493d5cc6f92839bd46181a6ea830129f07d7d1c6a2100d40010f1db0603865530b7c835737319a5b5e87ce993b3bb463618fd9b4

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\Y3JRZ1FQ.txt

    Filesize

    605B

    MD5

    d412aaff9a4ee5d0277b02e55674ea95

    SHA1

    c98eb619e8c7ffe631345dea0b463398dde0f643

    SHA256

    e5b87bff4d4bbf246c8ae3a33c596f013c14b336620b98950561e8b5b05a1708

    SHA512

    568f423153d46e454d210f191023e01e2e95bc2110c53f623994f92e5c4b76d56a9edffbcd0b750a5234da46588d27175f8d9c70349196275f4a425073394221