Analysis

  • max time kernel
    335s
  • max time network
    346s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    31-10-2022 14:04

General

  • Target

    Benefits_Enrollment.html

  • Size

    1KB

  • MD5

    a4b4f6b5fb51430c457cabe340281c98

  • SHA1

    93c475399aae2162005996c914498de913425017

  • SHA256

    b3a68a91a1acb2c7cc28520153d1f23fbe2d169e3a74aaf33d07a0053b1f33c2

  • SHA512

    c10c865fb6b95ec6194edf610f51c3adf92debb79b25a9a3dcb8bf589f3cdb003a9d19127620fd4b316544cfdf7852d9421701178ff5c6a7ccec047c0fbf5ada

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 60 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 16 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\Benefits_Enrollment.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:936
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:936 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:676
  • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
    "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1732 CREDAT:275457 /prefetch:2
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    PID:268
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe"
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1952
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1952 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:432

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Last Active\RecoveryStore.{34757B50-1A4A-11ED-BB97-EA8F93F2F821}.dat

    Filesize

    6KB

    MD5

    72988fd5e2e9b8b98ed5e14ec5df41ef

    SHA1

    46c823aaa3b1b39ee63c03fcb527a3943b9fed73

    SHA256

    a84b3fc0dbcbda105e606b60a9b2e173be40bcb68b901e0513c9c376a17bda88

    SHA512

    e5c89b5fdd32243ddfa262facb64db0f6f8e9bece130a8ad45d4a37bc4859bb07d6d8a8dc24b255d483842a43973d030959d6cbda542f1c1162beedb180a47ae

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\6DF40C8V.txt

    Filesize

    608B

    MD5

    c5cb25e79777ce3479cd4543a4e160a5

    SHA1

    cfba0a6c877bf36bfb71a085251f3edce1beadb7

    SHA256

    af814a976880c952adc4923ffe01d51d798ee6cdecff836d148f15959fdcf93a

    SHA512

    ac342e797d000082493753f90931e553e0778098b939e413bcfa9e75264cd685fb126c4d9f4b0f3ac48137ffb16fd885f8fc36441d730ee0bdcfb7b3ff1c7bef