Analysis

  • max time kernel
    152s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    10-10-2022 09:29

General

  • Target

    2.8.7.4(2k-XP)/ln.html

  • Size

    253KB

  • MD5

    6359288b93552e628ef8d7a948096d74

  • SHA1

    6dc99c96736dd47e686b0ee2be519316a71cd4f8

  • SHA256

    ce69dff10c80d130a002c6f1c1fcd4b1138e96167ce093f0af694311b4ea221d

  • SHA512

    3073cddd6ace77c4f3b713e8e762913694cda8cb53971b4877b9a159444b373cf0568ae5cab9f2ffaee6beaea8c4268e136164e4f7246cca51c8359d71ce9707

  • SSDEEP

    6144:ZX7Sh0dsr3ZpNSL8vhbcg7kdlQ3bF63/gXQoA6ErMGbjvnd7gMBWlBG26ja:ZLirppNSovlWFoA6ErMGbjvnd7gMklBx

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 41 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2.8.7.4(2k-XP)\ln.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1760
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1760 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1396

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    60KB

    MD5

    d15aaa7c9be910a9898260767e2490e1

    SHA1

    2090c53f8d9fc3fbdbafd3a1e4dc25520eb74388

    SHA256

    f8ebaaf487cba0c81a17c8cd680bdd2dd8e90d2114ecc54844cffc0cc647848e

    SHA512

    7e1c1a683914b961b5cc2fe5e4ae288b60bab43bfaa21ce4972772aa0589615c19f57e672e1d93e50a7ed7b76fbd2f1b421089dcaed277120b93f8e91b18af94

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    2e8dbd1dc68d5d1deb3bf3d852aba4c0

    SHA1

    45dfaa297e2f4e05a6f452d77edcc8d241c443e6

    SHA256

    f8f6f0abd1feac4fea8d3900ebab6845025d92618007ae14799d3eeae634c526

    SHA512

    5969ce449c2c6a98e3c923cdc6b7457f670193e21a9bfe176dd4632c4a7d0d44d847da0379ff78b5b5f5ce0b5a03dbcbf3561785afbd9e065fb93c30d5cc6791

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\L7Y8IJ3K.txt

    Filesize

    608B

    MD5

    99b6d7440fa448d74cde70d7a0af7c50

    SHA1

    8377ffbfd99650baec5bd1ba5b26fedc1f282ac7

    SHA256

    ffa95d61d297d8fe8ce29e65f4179d2b39f7f5085ac2be6fcfa1f92a2f06e3cc

    SHA512

    2d6a545a2037a538ca46fd69d4d8fa4767a481bae42740cec3f88aabae539ba88a78107b808dc86b073cf8117b2d1e7dadfc12aca50b1008c6ae8b6518f0702a