Analysis

  • max time kernel
    136s
  • max time network
    168s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2022, 11:24

General

  • Target

    0cb3eb7f5d21a9f6d988608de59870ca4bcd124a7f5ed84469e7573c1ac4cc4a.html

  • Size

    93KB

  • MD5

    61717ce074ee87655807f9e437e4085e

  • SHA1

    62f8493fd58773a81e370ece304c48426ff1442c

  • SHA256

    0cb3eb7f5d21a9f6d988608de59870ca4bcd124a7f5ed84469e7573c1ac4cc4a

  • SHA512

    19e75bbbea4316037ab341ef6ab9c85da43e665a42e288728093a3a66cecf66fd9736a7ae5061c46984c3ffcc83baeffd8fc0fabec18cb68318ba86875126d79

  • SSDEEP

    1536:8SDJHH2whHp8PUoPfeMqod6hxjsfX0c7rpq4u:DNHWqJ8x+3od6hhsTrpq4u

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0cb3eb7f5d21a9f6d988608de59870ca4bcd124a7f5ed84469e7573c1ac4cc4a.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1784
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1784 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1988

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    60KB

    MD5

    6c6a24456559f305308cb1fb6c5486b3

    SHA1

    3273ac27d78572f16c3316732b9756ebc22cb6ed

    SHA256

    efc3c579bd619ceab040c4b8c1b821b2d82c64fddd9e80a00ec0d7f6577ed973

    SHA512

    587d4a9175a6aa82cd8bb1c11ca6508f95cd218f76ac322ddbd1bc7146a0e25f8937ee426a6fb0fb0bb045cedb24d8c8a9edfe9f654112f293d8701220f726b4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    71eb36b8ffe6fc05c1f6acbb4d0528fd

    SHA1

    8476f82a323b96ac13cce1513f576c03238e3915

    SHA256

    44c1060bc01575da7750c424e37e90a1687ec4c1972f70975df36115c80fa5e2

    SHA512

    02c22b18ee70526008dea8501b9cc1d66dd6d737afbd5e0c57766645952e4c859723f97b1ec05aae1fb95c983d80fb275a037d3f6ec2e52166418277461c5056

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\XNHNHIT1.txt

    Filesize

    607B

    MD5

    d81cf3a0eef5e64bc7a0a02e45a1d07b

    SHA1

    15af5730f1edb9c132fdeac96dfe66136b93fc46

    SHA256

    1603f148190f579f39057ebee4e5fc32f3e693223ff4a19c5806c2169320fb1d

    SHA512

    2a6f96f6064a71b9395a0c6d338fc1e0efc6200138aa292f38c229c5a5982eda742d6f6f64b332401771dbea86b042f1464c8a39c108b082330f00948d662ee8