Analysis

  • max time kernel
    90s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 09:09

General

  • Target

    f3dc4b672e2361f49e5cc5d3927668d8701a390ceec8952c55acc82ec712e324.html

  • Size

    7KB

  • MD5

    9f02b8a55d1280fdec40bbdb42ecad95

  • SHA1

    751c57a5eedd65d5deaa5d4b9b8a12487d5d8255

  • SHA256

    f3dc4b672e2361f49e5cc5d3927668d8701a390ceec8952c55acc82ec712e324

  • SHA512

    fa8bf68f46195e48613991e682f8e348e892b03856f771434be25d334cf27b9a17459396b1bbb1da162f12c47bcbc87b17b3139b5a08b9cba9c36aa5d96b1246

  • SSDEEP

    192:AJSG+9PzqN/PR1A8nddLXuSwSTLdlLXugfo2Ku+oLX:qSGabMPvLddLXuSwSTLdlLXugfo2KaX

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f3dc4b672e2361f49e5cc5d3927668d8701a390ceec8952c55acc82ec712e324.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1812
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1812 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1424

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\N7IBWNWY.txt

    Filesize

    603B

    MD5

    05d499f74477059ac6478a7c6cfb30fe

    SHA1

    ab709f3440f9f14a4718e9cfa442acf772594e1c

    SHA256

    4da9eb43462261913f0d547bd365082c7c6d7f0cb72a08d8966453ecc62c6b30

    SHA512

    dfef82737a8962f11c62486b549dec07e379108e29abfc14bea7a7cd1beb30dfea8028c8f898d81af17ff831451711f69fa904776c52c23b524763e5cc25375b