Analysis

  • max time kernel
    134s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    08/10/2022, 19:14

General

  • Target

    SecureMessageAtt.html

  • Size

    201KB

  • MD5

    4af187f1eabeb2dae80ee8369bdda9da

  • SHA1

    16a241a3244f729133bbd0f92f580d8992d1861a

  • SHA256

    6a1df0b54b1f0903c2c97b799e95d290efdd01169425a07f7e9af7c97f727536

  • SHA512

    05a25f22b89bb7319fb6b68347a377f606aa9bcf9bb91fc9236e57b927768df63ff721803be4095412962f154c32d2620dedcef63e26bdf86d05c54c18cd0a70

  • SSDEEP

    6144:CWK3CO46fNbY1DI9QdTu2UYbKr0Qll/FwFcf/A:ji7xsI9QdinAKr0cFwFcw

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\SecureMessageAtt.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1212
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1212 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1736

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    340B

    MD5

    b63bd18665adebcdf711a18aeedfb8b1

    SHA1

    8ed4629de47936573d7e6955da5723dec1109f34

    SHA256

    cca21b8bce13ccb3acc8ea05d11d46ead5035d3cfc3ccff86f1f4fefe818d9af

    SHA512

    f09a5eb9f8d8510108546c99535a115b482305580be736622725e9bc9a2786c371a6b1b790acc548a31d12140b1c5ae4b157e6baefa2f7511dd89b8e5150c953

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\tcz8fqz\imagestore.dat

    Filesize

    5KB

    MD5

    9bf757ed82ead141491ad3751b310b8b

    SHA1

    292ca1957125a45444a89519563e529492d46aca

    SHA256

    e5ef3a9072bc1a7b11cd2d6b8d00784d1b9c62d2e3e8539741b74e471767af17

    SHA512

    1cd69f7dadd74b00acba0d7c36fcae38c7f4c667ed1e13d63bfc576b674becb06c8bb43c13115d02d7d4014e10a7dc2e21ca1787d222fe08623329e7740898af

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\ABJ45C51.txt

    Filesize

    598B

    MD5

    b7ad6133769a2d63f228f9bbb5ebd4e6

    SHA1

    617475a1f53aee1aed7d13615021c06d9667b439

    SHA256

    1100be4fab91d21156a5f8c37ad39973e797d700273c397818c0252876e272c0

    SHA512

    0529b217c8bf7dddb918bddee44566b64cd450ee1929465da569b76a07b12c559ddcd85909045baeff5ffe1b04d3da3be76463363b84f9ea66716b7c2a74f256