Resubmissions

21/09/2022, 09:04

220921-k12gkabebr 1

21/09/2022, 09:03

220921-kz8jgsfhe8 1

Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    21/09/2022, 09:04

General

  • Target

    0PSv-K6S.html

  • Size

    821B

  • MD5

    994262b501985e88257b9a1b0a422c14

  • SHA1

    5c5c67d529c0365ebe2790145fb284e80acdcad1

  • SHA256

    b805707ca31ad1fdf86038931ab8aa8b2ef7665661a2eabc7f2b2441e1d17357

  • SHA512

    3329e6f1deac06bb505ec19351395ec70074c82b243cd0b77d474fcf6dd1ae13237a3fd034f45d317451872c3937a3ae4d1b1c47ba0537d192c3d80505fed637

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0PSv-K6S.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1764
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1764 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2000

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    60KB

    MD5

    6c6a24456559f305308cb1fb6c5486b3

    SHA1

    3273ac27d78572f16c3316732b9756ebc22cb6ed

    SHA256

    efc3c579bd619ceab040c4b8c1b821b2d82c64fddd9e80a00ec0d7f6577ed973

    SHA512

    587d4a9175a6aa82cd8bb1c11ca6508f95cd218f76ac322ddbd1bc7146a0e25f8937ee426a6fb0fb0bb045cedb24d8c8a9edfe9f654112f293d8701220f726b4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0e3225be2490d8d588f02b8314788b42

    SHA1

    0b81342bcb8381aa3ee6393b58c5440d7bcadcec

    SHA256

    a3c83ba05e711c09f9b600d3cc6a56a40531fc176b910994c4593c401d491f88

    SHA512

    1fe8c2a3d9ab92cacb57384dbeeb2ca1c378fa4586e052cd05669a5237562c5efbc3d67c0a04c9fc058d67751c4cb84447867a11f7cfd7363fc748ab75c17aed

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\01FGK86U.txt

    Filesize

    593B

    MD5

    dbe103794ada6def43b5623d3744bcd3

    SHA1

    a0e460cd4ca30beeb5a990c888714ad8f487919b

    SHA256

    555a460a23c676bc8e912c64b5e7e8c144df2ff9d855926aae99d243395c4606

    SHA512

    b2ec4d8a6a25857f4723365d74b4b6f24c26a4c18554f83d6ad65b9d1955d9781064377b477c50bf4b48299853bdf52ceeee8490c9bad6e30ebb4886f4b30c31