Analysis

  • max time kernel
    69s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    10/10/2022, 09:29

General

  • Target

    2.8.7.4(2k-XP)/Blog/blog.html

  • Size

    8KB

  • MD5

    8a5da9c7cbac968c6b96d8c37ae43397

  • SHA1

    9380bfb32c8672a172826c156786c7aa49d84c20

  • SHA256

    09b0a74afb421fa5ea43a7bcc039eeb2124e7e5c4f4514bc3e092213479f099c

  • SHA512

    2afa21752746decc1caf7babfab55d5e4ab0bfe33b57f921ef2ce6c9677c5549dcfc6d6bffe9ea314356b6833019fb9e11b37262af98ddfda2b783f7f6544a4f

  • SSDEEP

    192:GflXI1udvjA34v1V3KpsXMSLwBHBO9k+J8:GfYudvjggVTMS81B

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 41 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2.8.7.4(2k-XP)\Blog\blog.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:864
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:864 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2044

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    340B

    MD5

    6e5a94408abe1fc51985ac48abfe345b

    SHA1

    55f537b11e9835e1ca0035695a433e6a96679c11

    SHA256

    995ea01e82cedfa4e13371cd8d80b2321e530fdaf54b212df481a7465144c7f9

    SHA512

    f36c61a7ba65e5d4abbe2c5b26c6541026d8d2d55c47cb37e37df03b77555a865e138b587d40dffcb7ba024fb3b14dcd303648445948f0a7ebee94867814806f

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\K6APM436.txt

    Filesize

    608B

    MD5

    475fc8cfb0c484c52ba282b13b40288d

    SHA1

    ead51db1325126a77596f0b0b3c9787566d81420

    SHA256

    0bcd8335e03046295bb2948e4df3ed86e028c3af06e6e2593b50b6f608c9ea4e

    SHA512

    693dbf6f504b8540b307b2b832fce8a6eb96be558a117982a4c1e1ad6e2a6719c0c318599ca2f324d5ee4015fa3053283d81fcedb7e43076dc7c3a45aaf3d32e