Analysis

  • max time kernel
    69s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2022, 10:09

General

  • Target

    404bfe0852b3af062696890006a6c4504bb479a0301cb4d6fe322cc9995d8f22.html

  • Size

    9KB

  • MD5

    61ee4bcf42be83a2eef0bbbc20a53bfe

  • SHA1

    6038294296acc745a48e723f75395c8716c5d4dd

  • SHA256

    404bfe0852b3af062696890006a6c4504bb479a0301cb4d6fe322cc9995d8f22

  • SHA512

    14bf89d6f7fc2c25dfac4b28a8ff90ee3d2ba855a4a1ad3662055bee7bda01d9f601b80b94868ef2b969d24afaf945f27a056db192199dfadc049a709d1af05c

  • SSDEEP

    192:39hwLsj+mT8bZuDlVky7G7nAj6AKP+HrnHQQtPuyZGh:5jnTOk3OAj6pP+HrnbtmyZGh

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\404bfe0852b3af062696890006a6c4504bb479a0301cb4d6fe322cc9995d8f22.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1908
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1908 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2020

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          340B

          MD5

          4b759f8fd0ecee2ccc48e9c90b685d9a

          SHA1

          2cad828ab3d12e21ae081a8b8a70665be4bcb48c

          SHA256

          926f47c43ce8e4ffbcb44c483c22d55294aae445330fa90c03e0d9c6bda124ee

          SHA512

          f21557a9d12f9ca98441988e00cb113be7879ca15aeeb89a5e7a0f8f519925e8ec30ccfb0100419ead98dc9ae58c9a364294b46a8f32de947c518d2a3062bbad

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\FN1NTSU0.txt

          Filesize

          608B

          MD5

          8e8e27de4c3ba14351951248a4cdea0e

          SHA1

          944fe7f1c938cc29b9a8702f9b6f3462175f394b

          SHA256

          df5371363ac642b756513b75e6e85432e9c076e870453d3abd32f4e9f0a5fa64

          SHA512

          6f6f4d6e5209a08f7de02cf313d7def0cefec8a3f9bf1e7f15070e021ddc9ef7db4d83227a32ee83c62dbd4eea6e44944ffad2a059d65c24158dfee81db815fa