Analysis

  • max time kernel
    123s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 11:05

General

  • Target

    76e8c6f63ed2d0dece46a892b01890278c4998c7a329d3f64734d0e0e3926142.html

  • Size

    1KB

  • MD5

    d8e9ff42b5a664f0bed6e4faff78c19c

  • SHA1

    449fae8568e708e4fc2e5ab302dc030e96072d48

  • SHA256

    76e8c6f63ed2d0dece46a892b01890278c4998c7a329d3f64734d0e0e3926142

  • SHA512

    6076a29e8bd5cc4c1eababecc4dafcf8535de7ee36c78449456713c1131bc0d462bc0056a11c0ba11c622dc439ca6ee469103afda8800b5b7aa83437eb08150a

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\76e8c6f63ed2d0dece46a892b01890278c4998c7a329d3f64734d0e0e3926142.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:864
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:864 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1116

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\IQIIEC03.txt

    Filesize

    603B

    MD5

    93b91637ae29a6c242c1fbef850e7590

    SHA1

    a62303b9a0cf8cbd9de94c8bc24325fee510a344

    SHA256

    8f2c9867d4e49332afbf10f1e7d0853561099aca17509c7e76886fbeae0f3603

    SHA512

    16d036f3194abb9c1a600a64fff10d2c3d94cbc52e121e63df1f1290ccedde6562457036ce8ae390a6bfb04a3fb6a87d953d4d9df0e05da7a6b95ba2cf934ca1