Analysis

  • max time kernel
    104s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2022, 11:04

General

  • Target

    9fde29f58e7103d000a1ad2fc55fa01b0e8917b4a077189e67a8c8f7b2973dfd.html

  • Size

    10KB

  • MD5

    d74205545b191c0c107db3cf567b708f

  • SHA1

    0cd8f81017b6bc67dc9765ebab8157977f2e93ed

  • SHA256

    9fde29f58e7103d000a1ad2fc55fa01b0e8917b4a077189e67a8c8f7b2973dfd

  • SHA512

    de279d4677b35b7fb7032ea1639ea2129183d8fdc4d60afb60c20dd26ee640ba17d4b7367c33d06897ac031616d05517c0f4119cb90fa3825cdb6466047af94d

  • SSDEEP

    192:Mql6pD9qnm+jNeeejeseJePe6tDpA4wq21JAU8zI/IESrdCKClYCOCV+2k:M/pG4QJANzI8dCKCeCOCYz

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\9fde29f58e7103d000a1ad2fc55fa01b0e8917b4a077189e67a8c8f7b2973dfd.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1720
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1720 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1084

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          340B

          MD5

          b68682cbf97a4e8181ad286ebd396ea7

          SHA1

          453204011656bafe1ace3518ce30c2afdcbeefc2

          SHA256

          295a3da375059ff8c46badea75e5694039dc1d79b77ede01a3b1b458a71ca12e

          SHA512

          fbf005aafffd257d8d715b1ef7c5b240abd1ed04ff25fa100a4f41b4ac38bff22f7bee8ef0acf914e8c5622039586e8a0a2a96120fe5b8646771961e39c33812

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\X8O3KVRZ.txt

          Filesize

          601B

          MD5

          9850cfc9756e5c996a6ed7eeeb56beef

          SHA1

          d02e8aadf7319af4939c0de276a3b0ee4bb4bbfa

          SHA256

          7784bdb79746181360b6d3258b9a6d29ada88dce3d55bfff389ae4ee8e1d8f7a

          SHA512

          ea97706616dbd25cce5f2dbb5b2a72331381f6c3f68f7c05a009b1a16abae9415b7dce0f406949dc5a3a1894d1622b07d85dc838a80a19f170b1c64cce4a772b