Analysis

  • max time kernel
    146s
  • max time network
    160s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2022, 10:47

General

  • Target

    a2d1534a1ea62dc4e1ce41c4ddbbce30b232d71a973c5ba69a9724b5f57d244b.html

  • Size

    22KB

  • MD5

    30f00c0f2254948dd0c9f6bd6f8a5875

  • SHA1

    700231e4e96996ca973a1dfed3fa7ff709379a1c

  • SHA256

    a2d1534a1ea62dc4e1ce41c4ddbbce30b232d71a973c5ba69a9724b5f57d244b

  • SHA512

    ecef1b308fcda57d197ea3af3ca0a086da0da217d82c05a2cca75a829cf90c5835d2bfd1b7d46d40b48757a6aff40ec0d5ac44a6f44f3821bc8a43d0d7700a61

  • SSDEEP

    384:zCvxbuDsDiNkod8IRn25uzmDD1YEYTCwdid4d0+K5KxKiK2KT/:zCv5bDOdBB25mYh/qbdBG

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 37 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a2d1534a1ea62dc4e1ce41c4ddbbce30b232d71a973c5ba69a9724b5f57d244b.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1524
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1524 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:944

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    60KB

    MD5

    6c6a24456559f305308cb1fb6c5486b3

    SHA1

    3273ac27d78572f16c3316732b9756ebc22cb6ed

    SHA256

    efc3c579bd619ceab040c4b8c1b821b2d82c64fddd9e80a00ec0d7f6577ed973

    SHA512

    587d4a9175a6aa82cd8bb1c11ca6508f95cd218f76ac322ddbd1bc7146a0e25f8937ee426a6fb0fb0bb045cedb24d8c8a9edfe9f654112f293d8701220f726b4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    706e2860159a9008e3d00a6ebd9c6295

    SHA1

    3c640671e284cf1752935d85f0b0d8733bc7fe88

    SHA256

    25d8b978a0ef281a7c055326b81a0acf229b349509e80bfa04b5e20c22ca88d4

    SHA512

    c1b8222108120461725e092079d22ca70a811079e03a46cb9d6e05e5d997194db24dc5d3803a96095073d07e7df9cfb92337950854b23ea20f3ccc9ccb1d982e

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\NPARMWKX.txt

    Filesize

    608B

    MD5

    b24aa4c1bdeff50d3c5e732e5d2411d6

    SHA1

    798845728fa720567765293f8d5b5fa9038688ca

    SHA256

    c7d02a288dd28ba37220050d181afacdd0fcda316b31ac5594dbb8ef369c9d0a

    SHA512

    96e51da543ec30d1caae1d70f5ae694fa5ccaa39d90fa315442247a8f1352e192c6ee9267d5af12c73c79e7e067e18cad84cc3877b4f74cc09d48ce28c1ac58f