Analysis

  • max time kernel
    281s
  • max time network
    186s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    23/09/2022, 10:21

General

  • Target

    bcfe3e23ecba33372017d4a21923c9b197f0b42e9726a9873ae53ea5793a3385.html

  • Size

    608KB

  • MD5

    b3b162d4487c781362f9e5941251b474

  • SHA1

    9eaffba8db0b7938d779c35ce325466f86f5d2b4

  • SHA256

    bcfe3e23ecba33372017d4a21923c9b197f0b42e9726a9873ae53ea5793a3385

  • SHA512

    d8b4f5becb0170f77d9e73742512a00917a957916b16d1177074aeae4c5ce3a32ad8ee62fc1c7b02238a88369be317c8fa6c8e2ee60107d7663dcd6c593df8c8

  • SSDEEP

    3072:HClpGTetRqX4wROwRubY3YiV1ytmVHbWCUkPDlJtLn6CVhJc7MwaMyFeqmqDCMAT:HClpGTCRqXlR7RNSvLF2RPthZwRdMC

Score
6/10

Malware Config

Signatures

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\bcfe3e23ecba33372017d4a21923c9b197f0b42e9726a9873ae53ea5793a3385.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1048
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1048 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:468

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7612548bb69b30fa9b768ec3c9df2c19

    SHA1

    bc85343edd65cbd4a3d86fa1f5dcc243642d041c

    SHA256

    eec7662bbdf522ebf05f9121bf9be064ca16c0281c13f1e1e00491c16445ec48

    SHA512

    42e6d47e9b3f18b232e21677171001deb251daa4792225b6ed9fd5a92f80aea4ccc31e33baeb802236654baa343d15a0cd30fe5696ea0f79cdf5de34f207b1de

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\LXET1F1G.txt

    Filesize

    602B

    MD5

    cef8537ed1672eacd7d7d6dc9e4f7bd5

    SHA1

    a6ad05a7772e745435b51bf3c096925c8d80a3d4

    SHA256

    6ce3ece3287b0a890f0c2857e70d05371df729d9f34e378c65037fb383ec82bd

    SHA512

    7d53403da8ddee47ad72466e1f179af40b034e8742c9c52c65f7816f58a3309d14a5f0bd0f5f3222a8fbadcbc04d396a2ca5570d98117cbceb5f9d384d868599