Analysis

  • max time kernel
    73s
  • max time network
    136s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    17/10/2022, 10:44

General

  • Target

    Report Jul 14 17886.html

  • Size

    1.1MB

  • MD5

    3ab23672966bf6d6425cf8cf9596e791

  • SHA1

    3240f4a8db891af084bf5642a9d15f217f51c9ad

  • SHA256

    0b4f113ade577f54b361efb513c9ea661a4f32eff0a5aa522bfceba09ac77ac0

  • SHA512

    2ce4c3f7a89cdaf03dcc0cf0e214bbd0e716e2cc62f21b0c8090cd4bc3da6d4dc8c9ead8d9d7fdb3068275e872a0092c0e037a76ec2cb32479d0256f3262c225

  • SSDEEP

    24576:pYorLQLDabjw271lQ3QQnO5TO1iqnIYBJC+Q9Jhz:p1LQLKDo3VMN+6

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" "C:\Users\Admin\AppData\Local\Temp\Report Jul 14 17886.html"
    1⤵
    • Modifies Internet Explorer Phishing Filter
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:560
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:560 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1620
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x168
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1384

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    340B

    MD5

    21622770a2d052ce044314c885feab45

    SHA1

    32edcec5c2113571f0a97c6780c7b32e56465192

    SHA256

    f7976106a0be7ddd083d1818d1ca1d85f95b1fdaa112eabcbd30379924f4e780

    SHA512

    d62f912adbdae4880412a6f2503245ba95c80b620999c6840657aa60386e5cc414ff3d497ecc2ea5cd8171a0998329d362d1de6967c2e9cb607f59443700c666

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\I9NA5QYV\Report Jul 14 17886.zip.ywg0c3a.partial

    Filesize

    696KB

    MD5

    781d2d37c51ab68b167653ce4fbc38a6

    SHA1

    f196137e3a6f68aaddf277728e9573f1b30cfa7d

    SHA256

    33e7a7cb48e961e3cb4dd9b5b22c9ee46d231042bccf87ebe036784fe54b3809

    SHA512

    a4fd1ac94a9ce42743a71041f4f02f9517ac3e4527b1e2e8fd9f155a3c67b73234dac68bae0ee157c0322bcfcdb53138615e122d061c94bb64e5673ef49ad388

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\HM3WX4K3.txt

    Filesize

    608B

    MD5

    02f55b8078c3bb2a598e63351aef9625

    SHA1

    0ecff50056afd82c92fdff4169a8cfab7c1cb9bc

    SHA256

    3c04481cd55ea920ae214c7c995c3a2a95d46316f55bf1687fa1d7569f2bc6ea

    SHA512

    4639677d9bd96637ce578fb897c2d3fc888e4204ad741816a7f670cc485b305b7bd6b5e132b0152bb51315a9377a1c369197fa2870fb43e9736d5cfafe78a0dd