Analysis

  • max time kernel
    146s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    18-10-2022 18:10

General

  • Target

    RequestedDetonations_0.4E74C4.html

  • Size

    940KB

  • MD5

    4e74c4c6399e2b709854e85f80a13a7c

  • SHA1

    a67c58f65014ddc6c9f7b6b39293bd1423ed48ca

  • SHA256

    20031e86a14d773e54b6d5ad53ff84479ae0508f5fcf9c299ffe311a00d0434b

  • SHA512

    04e0ef3b3219104dd8096fbefbd7576a5713a9bc7e857e8e3184a4da762c4ac8863a0ea8ddb61781ba8f1113bf64750b84ca19c12f02c597928b7b772d1ab212

  • SSDEEP

    24576:+8IytJpcu9Ddw+CP6zNF/j1jXhl0LJkq6:+8IxLSzNNx

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 37 IoCs
  • Modifies registry class 6 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\RequestedDetonations_0.4E74C4.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1044
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1044 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:1324

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    340B

    MD5

    07a5685846aecb0413e568dd64b7f8e2

    SHA1

    9afa7809cfd5a768a8aa600adf4298eca2319bfd

    SHA256

    6ba86be57b6ccfe92db273e8f94f834c43439b57b781fe5f2c40d7779e5d17f4

    SHA512

    8551b3aef563070998a72a66c1bb95f52a01228b0ebc7343d1a998d4ce167ac23bfc345bedc1cabf92d4444ce4a465e7296d5c4ae66d13099d210416def6796e

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\838VKIK4.txt

    Filesize

    608B

    MD5

    fd21f1b520815ee3b17380d69e172621

    SHA1

    72414930b1b1e48b752c4ce5adab4fad25bacc85

    SHA256

    19af489bd5c89a712824b8836753c24a034ced3af5beead5e1e33958e078d7b9

    SHA512

    482d5f1f36da63c54be2d0dce94d678ed90fb8d2d12c4d0278bf26b35428638776fee115dc06a2223b1e2378593eb76956261f82eb8a472d3b350ebce20821f6