Analysis

  • max time kernel
    154s
  • max time network
    188s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2022 10:50

General

  • Target

    49f354a76ec225a08c87292830f685b9bb7186fd75c4e0c51841b348fa0fc9dc.html

  • Size

    7KB

  • MD5

    2d2ae5096a03bfbee90496a1001825f1

  • SHA1

    de8e6b97385a733e10ecf8705a62cb1e15c1c2f1

  • SHA256

    49f354a76ec225a08c87292830f685b9bb7186fd75c4e0c51841b348fa0fc9dc

  • SHA512

    341fdc37f5ad2c69cf39b1a2f4876facc7b2e2199e0965f7915fa6015e3d9be7aca61bd461512c0c76a4a76921ac833c56bbc112f6463c75b8ad76acb94ffcee

  • SSDEEP

    96:xglnmzWK3uaiu5IEIJdXPOAM0EE4AsgxWCTvGU9+L+MvmE6qL+4ObRTjPMD4:iKWEulPdXll/VTvf+tH6oYTj0M

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\49f354a76ec225a08c87292830f685b9bb7186fd75c4e0c51841b348fa0fc9dc.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:908
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:908 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1988

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    60KB

    MD5

    6c6a24456559f305308cb1fb6c5486b3

    SHA1

    3273ac27d78572f16c3316732b9756ebc22cb6ed

    SHA256

    efc3c579bd619ceab040c4b8c1b821b2d82c64fddd9e80a00ec0d7f6577ed973

    SHA512

    587d4a9175a6aa82cd8bb1c11ca6508f95cd218f76ac322ddbd1bc7146a0e25f8937ee426a6fb0fb0bb045cedb24d8c8a9edfe9f654112f293d8701220f726b4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0346cf4746003cf5357ea6b815846cd5

    SHA1

    81424e7c431f022957a156c2dd30bd158587f8f3

    SHA256

    1a3e45af8fe9d11d11cc6c8daa5a2f3cd44e5ec05f9770aaef7519f5d956712a

    SHA512

    5e91fc6190ff4bada3ccbd3c94cff77f42d8799e921050f03c038509f3afc117b1dc8a56beb437b1006ec3d2d8acec8a1744f2e28effacc3d7efe1c00cacab36

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\HTHY5ZL8.txt

    Filesize

    603B

    MD5

    665afbf8a252e6bc9dc8168e4030135a

    SHA1

    a95bb167aac7a01916fef986967d37813fc12eaa

    SHA256

    9c1c822539eb857a9dfbaf2b321c46f5187e2e973bcb49b2d4fb6bf38ed7d595

    SHA512

    3eff1a90971920cbf989f06d25d8580aa44e184e3d25c1052069b82e78effddbc2d8f3fbbb52b283537923162eb399373d7fd2a9c68accaa0282a32791c62bef