Analysis

  • max time kernel
    283s
  • max time network
    188s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    25/09/2022, 10:21

General

  • Target

    8b06588cff3e70d469eb148537967a3a1d425ea6435b3a711194dd569b16ed55.html

  • Size

    607KB

  • MD5

    15c8d84761b78ad404a3fd80bbc5a06f

  • SHA1

    cae776ae13bcf746dde0b7ea1a03bc948e2abe0a

  • SHA256

    8b06588cff3e70d469eb148537967a3a1d425ea6435b3a711194dd569b16ed55

  • SHA512

    ced507676caf7b4094c98310fca504e67e883652e5217bae5070f9b36b4a348bb65d7a4cbb1d71fcfb1750f2f12a9969ca8fddd7c8ea7f65a93d24dc50ecb9fa

  • SSDEEP

    3072:OClpGTetRqXgwR6bTTwRudiV1ytfVrbWCUkPDlJtLn6CVhJc7MwaMyFeqmqDCMA5:OClpGTCRqXtR7RCSvLF2RPthZlXMDp

Score
6/10

Malware Config

Signatures

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8b06588cff3e70d469eb148537967a3a1d425ea6435b3a711194dd569b16ed55.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1424
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1424 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2040

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

          Filesize

          60KB

          MD5

          6c6a24456559f305308cb1fb6c5486b3

          SHA1

          3273ac27d78572f16c3316732b9756ebc22cb6ed

          SHA256

          efc3c579bd619ceab040c4b8c1b821b2d82c64fddd9e80a00ec0d7f6577ed973

          SHA512

          587d4a9175a6aa82cd8bb1c11ca6508f95cd218f76ac322ddbd1bc7146a0e25f8937ee426a6fb0fb0bb045cedb24d8c8a9edfe9f654112f293d8701220f726b4

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          640ffbcc70a630661ac5e53d813772f2

          SHA1

          ae412968fe3f484cb0e70d31eaaeabeb97e92a15

          SHA256

          7f8aceff81c5d040dc2c90614dcffd4de43cf5c2840c0e60e3aefa9b160a3be9

          SHA512

          15eb9f51518036581da1f93cf8fe7e2647cabad78d0a9347f57b35e88675eb027c6fb176af0be64e27ee5dd82e6133df02b593ee77153686121e6de5bddc0db6

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\O42BC70Z.txt

          Filesize

          606B

          MD5

          1533769e9fc1a65c77f97dca240f1049

          SHA1

          e4cf0aa963a0e4b1f232d9514adff5e8cfc26bbe

          SHA256

          e1666213626716fec3e5309f852b7d1458f38f0d4442330d0a9aeb97a6fd165a

          SHA512

          3ea3de1545f386086457ce87305434e00c39ea39952bb12e2e2c4c348a18b07c4c0bb93e8ad6f9f5d7291f424ee533c12e69ad37024b50b5651cf9cd87bbcaf0