Resubmissions

29/09/2022, 11:21

220929-ngf83abfbr 1

29/09/2022, 11:21

220929-nf245sbfbp 1

Analysis

  • max time kernel
    117s
  • max time network
    136s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    29/09/2022, 11:21

General

  • Target

    vowrmd.html

  • Size

    33KB

  • MD5

    e36545a48d5d045d4dde3a75c278d965

  • SHA1

    dcbb57d30d0d1da29242f890d3eebf35075202d6

  • SHA256

    f25a3a892bca7dd631cc1a685befd80c633c10f0cc58401c8fcf370a03321e55

  • SHA512

    2ce09116da7e7381f17158407dba70b8e845c93161c1a6b2a74bb61359e2b72c6f3637912e3e368371d6d4e0b148df8f93ac315e8ab94923a1e99636866ec7d7

  • SSDEEP

    768:cK21tlXT2sfSKsvoqSeUZbnBWNGOchEeU417Y/8YNAT9Pj:chlXasfSq0GDhwN/8YNATR

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\vowrmd.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1972
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1972 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1776

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    60KB

    MD5

    d15aaa7c9be910a9898260767e2490e1

    SHA1

    2090c53f8d9fc3fbdbafd3a1e4dc25520eb74388

    SHA256

    f8ebaaf487cba0c81a17c8cd680bdd2dd8e90d2114ecc54844cffc0cc647848e

    SHA512

    7e1c1a683914b961b5cc2fe5e4ae288b60bab43bfaa21ce4972772aa0589615c19f57e672e1d93e50a7ed7b76fbd2f1b421089dcaed277120b93f8e91b18af94

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    806d816e7a2ca76176fbb8dc10cb9dd6

    SHA1

    7a59389137740ff9831676fc85485864832bcf02

    SHA256

    95f1911ede8d4cc3677dcfc68dd24c7c4b74c70d8b7ae27e35067672a7239c28

    SHA512

    feb44231704f25500035b63adec07f01e7efa217bd5a4f0ef295ff3ea60f685d79ab63f24fffaeb1207ebb9e3bba5402a16d856aabd59535f06e813ce563e668

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\WZU21AIB.txt

    Filesize

    608B

    MD5

    6d56c550f1abd4440a7987d370ec6239

    SHA1

    cb9184e0c9a9bd5cddcabda8ed10669241e3a820

    SHA256

    9c4184080fe7751860ef57d2a2027f02cb6be796b211b24c02ee52d496e7508e

    SHA512

    c54dea0581594bb9bce281afae4394748bcd4c0054faee795e854121fdd41d9386e974d59dd7cbc1b9d385520094d87b2538179feca793edf39ef2793bb11f6f