Analysis

  • max time kernel
    67s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    07-10-2022 07:18

General

  • Target

    sample.html

  • Size

    237KB

  • MD5

    42a57fc42c5e9c7eb3ffc2db73dab3cf

  • SHA1

    abe2a27cfce382d76f8c92cc8cdbdbdb9629a157

  • SHA256

    a5d5fea1dc1e6a260fec4d28d080ef88696227d7785a499e5b2a7763c1ecfb21

  • SHA512

    7bb83803534072e3c093afee853569e22882c39299c67842af13e11b5ac161d8be745ce6a784f18ce7cc3ccb88c4a67b8e4a0cf6c230c2157ea1a06b06adb391

  • SSDEEP

    6144:rBxzEOQk+iea98HrqNieePiQkpRYDxvakkRTAage:MOz+ixNie+iQkpyDxvakkRTAage

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\sample.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1824
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1824 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1964

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    340B

    MD5

    dbee9e6ad209c56a5f6c724e08c6e01d

    SHA1

    385ce1b4d708d28015d65f602a338aea54622adf

    SHA256

    3f72104786da494bcf291cd8e8a3b040488d48cb3ffe006d071487e1129bee2c

    SHA512

    0b51d816729e496876806b5ab3f4a9bbfc90e7c0bef758b8e9cffebdf5e0c2c7be0eb2f7fa3da9c1553daa98c770c9c2f9f9005ca3637eaf5a99a8c10b698ce8

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\VMGSQFF7.txt

    Filesize

    608B

    MD5

    dfa6bd92e5d28f6c26ca90c035191642

    SHA1

    82f55e3faff704afd8a5fcaeb69c616785702dab

    SHA256

    708936c59445379cbcec986e3a96f45b6591ee52a52f83fc22170ceba9c6a12f

    SHA512

    e39976cf46069114278d2ff004757c2493569334b44b0fe15d2bd1f378bbbe20a049a93d64018c7ea53e24a78a4c62177a1b3dc3bf2dd61f92ec59bdfc6dbe2a