Analysis

  • max time kernel
    160s
  • max time network
    178s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2022, 10:57

General

  • Target

    9ad89a9ac277d50bc92a98a1c8ddcbcb0efc210a3da745286039d85d14cb6e05.html

  • Size

    3KB

  • MD5

    cb80b58f2c3a4dcfe0fc9153f92913fd

  • SHA1

    924adc499b55cb2076bdc02efc9f05abfdcf1e4c

  • SHA256

    9ad89a9ac277d50bc92a98a1c8ddcbcb0efc210a3da745286039d85d14cb6e05

  • SHA512

    14bda2fff35b47fd144ad0dcd28392aa103d0e8264546437ca30edb143a19c49eeae11ea9badaf982cdbe8a30388522125f9541c3e0231bb08ca63b942e522a4

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\9ad89a9ac277d50bc92a98a1c8ddcbcb0efc210a3da745286039d85d14cb6e05.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:368
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:368 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1724

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\9HA9J38N.txt

    Filesize

    603B

    MD5

    85162300d8854519c970fa59170fb29c

    SHA1

    1307e56b5396ca3a56a842ea021b24ea41f7f853

    SHA256

    3035167afe726113a09008db77f6c03a9ffef0953eef1ab0f151cdff95f8b3aa

    SHA512

    7a44586ee2bb63c1af3c19ce8f51e0f7e5530def9646180b4eda808fd4f7a7bf5b47d6b2d95f0f0f9fce50a4fd53093a40d0db84abf10fb61f72df9b79d1483f