Analysis

  • max time kernel
    281s
  • max time network
    187s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    21/09/2022, 22:16

General

  • Target

    63b8479bd76dda6d8319bfe64fc22f157ee81a659452fa027ba18b96322eca90.html

  • Size

    609KB

  • MD5

    86e1e8453d6de39c66bc68d1aeec1243

  • SHA1

    8c96c704c8637633262bb6642ee6a65fe3c66871

  • SHA256

    63b8479bd76dda6d8319bfe64fc22f157ee81a659452fa027ba18b96322eca90

  • SHA512

    d4259583e2d493c635b48359b978d22f7e90477d04f3c00de5c4a4628f27d314228fcebc0e98677ff67bb86bc0c73c59e991b8a5dc61eacd4aa37973264f4306

  • SSDEEP

    3072:0ClpGTetRqXgwRsviV1ytjVswRuzl84NebWCUkPDlJtLn6CVhJc7MwaMyFeqmqDb:0ClpGTCRqXtRgRQcSvLF2RPthZpWMH

Score
6/10

Malware Config

Signatures

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\63b8479bd76dda6d8319bfe64fc22f157ee81a659452fa027ba18b96322eca90.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:968
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:968 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1976

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    340B

    MD5

    877899e1369bde28e659ca0361ddd379

    SHA1

    dfac345d43c671f20443b55cc3e160a27dd14565

    SHA256

    b2a623cb02ce56f928953297bfa2cfe1a709bf68757d5950c30afdc8fd57107b

    SHA512

    c01c3f7637d1d6452ea0a17a0581dd700e03e2502b690983a31e119df71481f92ff5095e3cdf2ec2678d77e433aaf02165ef796a2af3fa600653ef0d62347ff7

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\SWBIBZ2M.txt

    Filesize

    608B

    MD5

    1a1035fa9abd18e2049872488ec1eb90

    SHA1

    faaeeab6f939b8d054978e3ab2f80c5e9fb47be4

    SHA256

    1878b377ccc30ee36d77923121b368e6e6a985fde2062354afc11a131ebb2d8e

    SHA512

    fce3a79404523e844a7ba73c4dfaefeac94fecbfc5a104ac5706d6c2912eb29518dd7136ff9ba55ccd0a7393d6eeb0385185a0fcd2e64a22d1e6822664f86abe