Analysis

  • max time kernel
    107s
  • max time network
    157s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2022, 11:51

General

  • Target

    14e4662ca3c295a89cda6754117b2366515a14bd4d651b8a14257b38e8898017.html

  • Size

    122KB

  • MD5

    7773177faa1b3d933766fe67b028ce74

  • SHA1

    41bcfcfece701fd94f97756978c7a20d19aeae31

  • SHA256

    14e4662ca3c295a89cda6754117b2366515a14bd4d651b8a14257b38e8898017

  • SHA512

    d2b4998f0c86f177d603f5ce5d1bd72ff32734246617a959e3188577bbdb325cc1b594951e4230e42626f16c869702499d0daa2fc42aca931f2eabeab07d990f

  • SSDEEP

    3072:qjC5aFf2aKlWN9SQY4ThzEEm0l2yrllqZsqP6dHhTHS2uOjF:qjC5aFf2aKlWN9SQY4ThzESTF

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\14e4662ca3c295a89cda6754117b2366515a14bd4d651b8a14257b38e8898017.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1632
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1632 CREDAT:275457 /prefetch:2
      2⤵
      • Enumerates connected drives
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1404

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\5HVAOC19.txt

    Filesize

    608B

    MD5

    3f14b791c6f53b11260dbb24c6e74e4b

    SHA1

    5261744c46bbbd03b86f6aa196e4975d1c87a1ff

    SHA256

    04778515b31173cd23b43db64b1399be12439e339970b073039b8e96ea7a41df

    SHA512

    e9b53d71dd0b2e934ea2ffcd819a85bd9e4b615d4bb0873e63c41be2f5532f63f14ba8eff1dd00862264fc2ce68b9e2686fba9cc61cb47ad253011394948ad87