Analysis

  • max time kernel
    121s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    21/11/2022, 23:03

General

  • Target

    a07a26eba6fb2d8346f2470ed8f30d9948ca14cbe782c1a7d3d3ac2f2885a365.html

  • Size

    7KB

  • MD5

    cc52131194f01c8be004a3b71d638a84

  • SHA1

    a94fda50c41169a51125c93f5b848a5d248ce53b

  • SHA256

    a07a26eba6fb2d8346f2470ed8f30d9948ca14cbe782c1a7d3d3ac2f2885a365

  • SHA512

    00a345c6a9bddf4efe757055e9c8a9700837fe71c20a3e7c5d19c68a65ffc9f8c2f68527f5e19cd83df82a7938da6f3714588f31bcfb25eb3c75045025edeafe

  • SSDEEP

    192:1rJSG+9PzqN/PR1A8nddLXuSwSTLdlLXugfo2Ku+oLnU4E:1dSGabMPvLddLXuSwSTLdlLXugfo2KaE

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a07a26eba6fb2d8346f2470ed8f30d9948ca14cbe782c1a7d3d3ac2f2885a365.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1744
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1744 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:268

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\RUKVQC0L.txt

          Filesize

          601B

          MD5

          5c25c8523b634c77ea77b58264255ec4

          SHA1

          46ecd568c421a07a5b63339c8a6f71f4b99db129

          SHA256

          ab29e2deb7557da23372df20adcb55d32fe49005f4d618cfd4531bdd2f7e2b98

          SHA512

          c6428cc3aeec90804503ddb9c9a0bd9b2419398e38651aeeb43a97a8d2717eec65bc5a377641e9c555860890b50fe3c016b7e96b9d406a246b7b80d7fbfc17a9