Analysis

  • max time kernel
    170s
  • max time network
    176s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 10:37

General

  • Target

    89d88fffda9556164a351fc76948e39523545b73abd74231c7003f7de0777d14.html

  • Size

    221KB

  • MD5

    0e3eae3cc563b64b9f93ffe1ad4880e4

  • SHA1

    127f7c3fbafb97db9317e35d27e67c7510041154

  • SHA256

    89d88fffda9556164a351fc76948e39523545b73abd74231c7003f7de0777d14

  • SHA512

    107faf975c9088a8ced88c599a0b9f072bcd740f3d4591573d985254f2e80b34e12188276e63996ec3668d22cafd852d6cd1a42036f8e41c7e1b659d73ec4329

  • SSDEEP

    3072:cavms9rhB9CyHxX7Be7iAvtLPbAwuBNKifXTJm:Tz9VxLY7iAVLTBQJlm

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 46 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\89d88fffda9556164a351fc76948e39523545b73abd74231c7003f7de0777d14.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1512
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1512 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1744

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    45313980075ad235f6cbb449d974d922

    SHA1

    4c0ce577ae50277e5885bdaf3cdacd984497e944

    SHA256

    c9f6334a1428a594847caa5f507ac109fb35db93c1b14d49f902c0ef64788e95

    SHA512

    8347c6fe8bcd0f4870539d54dfce61b6f349755f7121cc4b920044be588d61ff38656813cd6c74c96939094ec43b1426c8b2fc313647a2c772ee614e60c26374

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\BNWHBKXM.txt

    Filesize

    608B

    MD5

    b3b011aa335608839ecb3f781980bbad

    SHA1

    b98d8381b9fa5abe813b36f15c9c128b6e346f9f

    SHA256

    6a77e52de7b456b5e4a7b7a8ee29b952f79bc7458ba2c5a22393e963df08d867

    SHA512

    4d388974581485efe006536a449b46fcb33062c0657c3278d4a51b14918433ed7f93b1a6e1c29612d553114f6ad191c117dea6a70315988e38e57ec67083970e