Analysis

  • max time kernel
    147s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    20/10/2022, 20:58

General

  • Target

    99719765f21ad11e17654be06be2216cc741d5a4d17ca5492e2190ff145e6a3e.html

  • Size

    29KB

  • MD5

    c04bc1ce36c99a5a9a083dd5c94f33fa

  • SHA1

    13995211cc519972d4a346879c2c7b6f6e26d01a

  • SHA256

    99719765f21ad11e17654be06be2216cc741d5a4d17ca5492e2190ff145e6a3e

  • SHA512

    8f7bb3771decd54dae30c36bdcd473b2f334065384abe3ea5643a685c89aea11598d2ede727cef2afc2c769055751e51b79bccc27617fe723235789f78c08c7d

  • SSDEEP

    384:n3F6lcKFf4hauaB4nXnmfnaj8Qr3wMrwwoDtajyhmnKSN1kNOuVU:4lPuhV3Aaj8y3DXowjIjNOR

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\99719765f21ad11e17654be06be2216cc741d5a4d17ca5492e2190ff145e6a3e.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1696
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1696 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1880

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d0bae35ff9636b6b8782ad94523057cd

    SHA1

    c4bc9bc5b407e64f419b08e5636193d78fe14f29

    SHA256

    f80908b6fc84bca7b33a6e49bf93fc22cbc32176e2ebeb49df253492ef995564

    SHA512

    6d29fe388dc6e7b8f43bc2cf05668fdfb87d67e387cd9c83d61be083204bc3b2c95e5a7f8f2e10eb0b5272d1a2e7bd1f4919bdcea0e67e6d8aef0183b493382e

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\UGPCI04O.txt

    Filesize

    608B

    MD5

    f3ddb94ee9a5795418a5f53c34417fde

    SHA1

    cb2f1864f92177bb0b321e0d27754d9749c10139

    SHA256

    40dc3e7f46cf46551908ca944636e21beb26f997dc61d7a6ba28910948b0fc5f

    SHA512

    5cb3bb5dc6d718a91d2c60f14fc231e58ad5bec99838af5c4219095fcc8441d6aa8c7387ea6507a336ec80ee0c3f46863bf8da0f990b5372ad1cd6fd8b583ceb