Analysis

  • max time kernel
    117s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    21/09/2022, 03:43

General

  • Target

    VRFAVS02JADFSYP04_pdf.html

  • Size

    102B

  • MD5

    372fbd869903bf41bc892d715783ae8b

  • SHA1

    56ec1889b796449d13b4d2040cec051ce07f90a3

  • SHA256

    6916533072653305d17d18d8196f7dceadd8952e200319054ece51d4e394bdc3

  • SHA512

    8955d789e9b130fdf987a02f48f581a4ec4068abf02fa3d26913eb61c4b45906a12607773d3c43bc63064cf1166177c466b2ec7939d235ac6aacd54f4a0d8198

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\VRFAVS02JADFSYP04_pdf.html
    1⤵
    • Modifies Internet Explorer Phishing Filter
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1764
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1764 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1732
    • C:\Windows\System32\isoburn.exe
      "C:\Windows\System32\isoburn.exe" "C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\0LYNQJM7\VRFAVS02JADFSYP04.ISO"
      2⤵
        PID:832

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

            Filesize

            60KB

            MD5

            6c6a24456559f305308cb1fb6c5486b3

            SHA1

            3273ac27d78572f16c3316732b9756ebc22cb6ed

            SHA256

            efc3c579bd619ceab040c4b8c1b821b2d82c64fddd9e80a00ec0d7f6577ed973

            SHA512

            587d4a9175a6aa82cd8bb1c11ca6508f95cd218f76ac322ddbd1bc7146a0e25f8937ee426a6fb0fb0bb045cedb24d8c8a9edfe9f654112f293d8701220f726b4

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            344B

            MD5

            4e1e8c0203ad050da86360eaf3359f48

            SHA1

            1ac074c36c5fd0ea9417fec20b6e1eb92ac3c35e

            SHA256

            b286a83e8ca8a57ca4b40cac185c0268ec4e66c2fe592a92969dd7ef2882fb44

            SHA512

            48542acdea120d0a541fcfda9214c07961669124691d1dc72becd7192997fbc07fcb57d34a131019f880c63607577f553dff57f5268f25e44d75082b36b512d2

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\0LYNQJM7\VRFAVS02JADFSYP04.ISO.18f1f36.partial

            Filesize

            300.6MB

            MD5

            ab86b2a828271fae9eaf84df54355115

            SHA1

            97e96aa77af212484282c6d674bcf2e16bb9cf8d

            SHA256

            3df9e84055f4afff90bb1e40cf51d377bfbc950ca45093d77d881db146026ac7

            SHA512

            a229eac463fbb0f2cd90346ab728343877417c2700cd6afdbd5c130cfe4b1e943e85ce968f99304701ee555cbc288854ca38fb9b176ab7d205d590d960809eaa

          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\TZGSSIS5.txt

            Filesize

            601B

            MD5

            f4ad0b722bc35f41bcc949e02d0e371f

            SHA1

            9e4c42593237e24adf1439d87dc254e89760727b

            SHA256

            2fde0dff726b33c34bbe85537f2a6392aafc5fb62bfab8774ed87abb73d8e7e6

            SHA512

            59d10bfca2bbe1afa55a5930cf22aefe6608f9b52c5c9c44607c6675f859485d92d32731ba91cfb31dbefb1cd75902f0a78de62bfd4402e4415395e595583965

          • memory/832-56-0x000007FEFB871000-0x000007FEFB873000-memory.dmp

            Filesize

            8KB