Analysis

  • max time kernel
    134s
  • max time network
    174s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 10:39

General

  • Target

    1977cfa3d110312f49f23c779634d0955c72860173dd8fe21d4f17903a490237.html

  • Size

    840KB

  • MD5

    b33a7f83bc22533ed022bc484650d750

  • SHA1

    c3d27386fdc2361e0e069c5619bb137626fef1ca

  • SHA256

    1977cfa3d110312f49f23c779634d0955c72860173dd8fe21d4f17903a490237

  • SHA512

    8cf27cdd67de45b5373e8e33274081cbc834fba927aaa18123768bc519507ffaf3f8d3a02089d7e17f330b5af253217828ad0f5c8897128e15e27076649d21ac

  • SSDEEP

    12288:SJMO7ojYtnoKXrqytbeJMO7ojYtnoKXrqytbCibMll:ye5e3iwr

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1977cfa3d110312f49f23c779634d0955c72860173dd8fe21d4f17903a490237.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1664
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1664 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1980

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    61KB

    MD5

    3dcf580a93972319e82cafbc047d34d5

    SHA1

    8528d2a1363e5de77dc3b1142850e51ead0f4b6b

    SHA256

    40810e31f1b69075c727e6d557f9614d5880112895ff6f4df1767e87ae5640d1

    SHA512

    98384be7218340f95dae88d1cb865f23a0b4e12855beb6e74a3752274c9b4c601e493864db777bca677a370d0a9dbffd68d94898a82014537f3a801cce839c42

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    42e2b5033a89415b619c7a404197de7a

    SHA1

    23811159ac2433d44f747771125869b66860ae54

    SHA256

    b2d52dca76c687cad232bf310f39db4b44f4c7357ddaafa40c0cec90c61ea56e

    SHA512

    56da493e902e0b807068aab58ec248caa6deef634d89aced6f9cc8aa064fd9ea52c1616eac70857ac3e2f0f42bd042af1d1498c90f30c100b9d9a924a3605f36

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\ENH1A6QC.txt

    Filesize

    603B

    MD5

    8965e6d9b28f7877640c20a1bb990a3f

    SHA1

    1d802a836c96323273ab2541dd12579cb1d3a800

    SHA256

    20011eaaf5cdad249a0081ca07161666c72ca18535fa37f4e8eb372fb864d49b

    SHA512

    9076b7d82b4e4ec2525a50e4c4ee5521dc72b268665103e46a1ae91f5028f797cfe2b98b6c2fd051830571c39b8400eab602e0acffe00d37fe9e94d89ba6ff60