Analysis

  • max time kernel
    196s
  • max time network
    187s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    04/10/2022, 03:48

General

  • Target

    e023edcc892bf379edef3dc88a2130afc583d331f0fce04c428c354e563551db.html

  • Size

    6KB

  • MD5

    530d928f3b2537c5734145d4b982557f

  • SHA1

    920215418133e70d6b9673820a606cf9a078770e

  • SHA256

    e023edcc892bf379edef3dc88a2130afc583d331f0fce04c428c354e563551db

  • SHA512

    5cadded9119fa594880507267767dc57ced5a6c88716574d89ec17c54aaea1502aa0d8f904f010bb95f512f56004803d3c8b256a06413e742624920f414635e7

  • SSDEEP

    192:hCgUXmXbXqW0N0v0CaBz0wY8yr/kf2jRnQ5/e:hIIr/kG

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e023edcc892bf379edef3dc88a2130afc583d331f0fce04c428c354e563551db.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1700
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1700 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:432

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d9e805dd3d6d2aba628990718bcb0ebe

    SHA1

    c73ffe9e2dd75e3a6f12eca8da3c8c19c7ae16e6

    SHA256

    5a9fa822c6545fb9cd6358a31bae3eb130351ee947bdaa93f29a5e02b25cecfa

    SHA512

    0a43ea75af1ccc39b42f05b0c5ab74aa2c2e444e32e8f3e2a0da30e193b877402412024d01abe53d44321c3d0c3d6a8e413a7aa87c48356c17dbc16865b8f118

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\1VYZDLTS.txt

    Filesize

    600B

    MD5

    0d78e089afb25125cc48d5f08159d2af

    SHA1

    27ed85651f100a73e1cba398f9c41be681554231

    SHA256

    01f76a3112a4ef0aa4d5c2dca8c474ddd7c70b1a619ad824ab5c2d51bfc5dbdd

    SHA512

    4faeaadd47973144048b1f25b871fb6020bccfeedec5e06eee832763b3a1af29026671d9d0224e2883dc3591ef388a4c8f6c61ef2ce5b651c52c72b665fce5c6