Analysis

  • max time kernel
    142s
  • max time network
    176s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2022, 12:15

General

  • Target

    165936bebbcbb3fcd835a32db5a409786b2e555fd582a12d6dc1a13dbea7c65a.html

  • Size

    17KB

  • MD5

    879172664bd8fca12025cf4158be1ce6

  • SHA1

    0613c9a5fa31aef7ae9c59ec894e251d3902f538

  • SHA256

    165936bebbcbb3fcd835a32db5a409786b2e555fd582a12d6dc1a13dbea7c65a

  • SHA512

    dbea5b019b9f65e4bfb164fad9605ef87f30f550b518893cced941ec0f43246474adc7e766b26d7cb168541196ba223d44e0ce9dda258de99628cbdb6d2072a5

  • SSDEEP

    384:xDEZOxqAdLaeA/P1W1YYIqYcA0AEyGmpMgfCuQZiCd57LlKzW6mozLcMRzm0m4vz:xDEZCqAdLaH1iYYIqYcA0AEyG4MgauQS

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\165936bebbcbb3fcd835a32db5a409786b2e555fd582a12d6dc1a13dbea7c65a.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1012
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1012 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2036

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    340B

    MD5

    a3c80711842a96c1f7ec5c4d4adf2252

    SHA1

    920cc053cba916c24ee59b3cce03dd1c48ba39b4

    SHA256

    fdd070e09a8aa6dd5c99b9539bccc5e45bee8b5bf48a96a152e54a6260df6ba9

    SHA512

    17741cd25aa05dc6d04d6c2c637aaf984b2fa734dcc8ead9012ad2dc2fcc2e8e7ab45b8fb99f7f4f1f3fa28ea8589818b54fbee5e2d7107f64f620088e625caf

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\9QYNMD3V.txt

    Filesize

    603B

    MD5

    5e2fd70d7d3148d2dc88b6c44847c3dc

    SHA1

    10efbd4445506236a78c98e681b6640b334e1cd1

    SHA256

    f20c5485999f09217625d15510c3f777c52da44e715841b311d3b776c7163c80

    SHA512

    ccb3a4d27f3b2bb00c055e6a75df1423b4a93f07e15e13c133193adb55c5ef1e5aee8f5a2f03c73f989a83ba77b813e2524385150ef259a7549f4d878454c13a