Analysis

  • max time kernel
    197s
  • max time network
    187s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    26/10/2022, 22:18

General

  • Target

    d5a4b77d2362613874f5d70bc2883d9e8fb719ae74558d507d158e05b9c5823e.html

  • Size

    6KB

  • MD5

    2a089867aac1ebecb926a850f5dac5d8

  • SHA1

    854cf785c827c6542c9156520d7af047a17eba85

  • SHA256

    d5a4b77d2362613874f5d70bc2883d9e8fb719ae74558d507d158e05b9c5823e

  • SHA512

    8494163b276d94de4f69d20bcf7dd74e7f8396addb6164d86a4d043b133184ba0f9cf2a7a2e05fe7bae0ee5c91fec08a4c4230b92bb37e49e6ad8f626d82eba9

  • SSDEEP

    192:JCgUXmXbXqW0N0v0CaBz0wY8yr/kf2jRnQ5/e:JIIr/kG

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d5a4b77d2362613874f5d70bc2883d9e8fb719ae74558d507d158e05b9c5823e.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1672
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1672 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1092

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    340B

    MD5

    0118d4c9fe297b646bfa231b6033808b

    SHA1

    d02198b69f6631facedbca37fb3b5e5e73c36c10

    SHA256

    91df62d7e13fca7e294be800ba20c8a4669e8eecc999a20a8ad2479ec13edc43

    SHA512

    8f67127a97bac4d212c6ce35282f930cce8d159a233892bd15123264bece24387e6cc479b533a77111394af16777a8c7b9848ca9139495d28864b74b030932d9

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\42T4JWTP.txt

    Filesize

    601B

    MD5

    d23baa83424eb6ec444ee9fe7b0eea28

    SHA1

    1b825a241697090a5969a0a94ad950a18fd4bfc6

    SHA256

    f9b2142d7fc5eb8960c8f3f85f0cabdeea63eb2a75916096319ed58e9730ee39

    SHA512

    4986edaecad3e9e65e17f7f57be314fa1b57446c809e0faead27c80b4bdf44a7931299ba612cc52f10a84fa39ac1d65027271928e82586ab83b0340bbcdcb154