Analysis

  • max time kernel
    66s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    17-11-2022 20:38

General

  • Target

    a1c984514cb1d1be0c059d668f8f4428.html

  • Size

    932KB

  • MD5

    a1c984514cb1d1be0c059d668f8f4428

  • SHA1

    d3efa7eca7e51365f81fbe41e42aeef55851747d

  • SHA256

    2b240d7248367d8afe7da53dce775677b50e3f721cb2525ed33dbe183e2d50fd

  • SHA512

    a5a509515557b11cee9566d97aae84e74ee8aac804ed61e57fecfe00613340cc48133a009b3b7858189f2b59ba9c53d3139496ae78084ad2d797e4a83233ed10

  • SSDEEP

    24576:BktK0GW4wnqRrEWJ2+fOGp9aY6DftYZmKq:b0VqH8kEWm3

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a1c984514cb1d1be0c059d668f8f4428.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1756
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1756 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:580

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    f8d7fae74a9fc5941964d694c40bb130

    SHA1

    e0096f9b12e927f4243cc3861283cc79cf16b4a2

    SHA256

    0744fd090dd66caf3544c111fdd81c5d9638b1607062af8208d324cb5fcb336d

    SHA512

    3ad110630f98f6eada29c2e654b214056be3a9fbe1e1e880bd2603aafd254fef0dac84434dec832cf59fd7af24fb8155e30238fcc8d75e65c9edfdc1e56c7464

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\Z6CJOZ1B.txt
    Filesize

    601B

    MD5

    1e85390c510058770ac64ffe11aef6f1

    SHA1

    d0cf659dee0e0c0fe537c1e5a79fd9804c6a51f0

    SHA256

    5c56ef78e5c78a73b3346a53f9609b61a644f2261732c1fc0efd0862fce18d3e

    SHA512

    24a2dc3b3cb8f993a2683529e6480a75452e26aa5e04d19b6954fba95b00cd758821e21d5a2ea210c84d404e6e55a60999645d25ea55162618acad94a1d17e79