Analysis

  • max time kernel
    104s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    17/10/2022, 05:28

General

  • Target

    ad43c8d44584f92c8a359c3c043205c6.html

  • Size

    4KB

  • MD5

    ad43c8d44584f92c8a359c3c043205c6

  • SHA1

    3b8487ce0d526d89409b5d6a9edad69df3467b07

  • SHA256

    6a1dfc4b74b4f8f92b56b1cb0aa45840ee7767087e732876e08d6df07288bacc

  • SHA512

    afd575eb01396dfa3cd0d739fcda5a322b30482ce096a0e30b9cb7c230f48cd4a4159b226b2ca447a4286f3851d8414e12ad0c2262e649dbf4f88d2799cfcf41

  • SSDEEP

    96:DzE99MNW9FzqqAA+XKT40BtunnhPwr59JL6wRq9fq2WMm6qx4tQ2XbI:DJNW9FzqqAA+v0BMhor59JLRqpq2WMXc

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ad43c8d44584f92c8a359c3c043205c6.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1672
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1672 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1472

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    60KB

    MD5

    d15aaa7c9be910a9898260767e2490e1

    SHA1

    2090c53f8d9fc3fbdbafd3a1e4dc25520eb74388

    SHA256

    f8ebaaf487cba0c81a17c8cd680bdd2dd8e90d2114ecc54844cffc0cc647848e

    SHA512

    7e1c1a683914b961b5cc2fe5e4ae288b60bab43bfaa21ce4972772aa0589615c19f57e672e1d93e50a7ed7b76fbd2f1b421089dcaed277120b93f8e91b18af94

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    9c72fbc581a40941091af98dd4bf4795

    SHA1

    42d9a009cdf2d0be5f92a35d5342e4f1e4a578a4

    SHA256

    be7438bd515300fb78bc6e9d4c66679ebe2c3a6cd8c21af3e39345289167bcb7

    SHA512

    32792777b565a5c360199e5b8d09c407720da582bfc64c5ae9beb791821d591a6af75019dfd3f9b3b0d5f679f32dd0bdd8821174115884ef940cf860f387e616

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\J1RRDJ5B.txt

    Filesize

    595B

    MD5

    5c2217fc6778d90c0630893555a0f2e9

    SHA1

    5a7b245dd209d724814dbef213d0a5c429feec46

    SHA256

    5f15c381acd932d775239f59761f23f18e94f9dbfa3e5e8372f9f06f0adc5e38

    SHA512

    015b5093ba6db7d029e8557752c0557e65c9e82fffb37e21a8b23dc430a156a0c9c1225b1537030cb4667b4a979df7d89c74ecbf4a82db13b16accdc6e135b1a