Analysis

  • max time kernel
    197s
  • max time network
    316s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 12:59

General

  • Target

    NEW VOICEMAIL _MP3_11232022 113052 a.m..html

  • Size

    39KB

  • MD5

    8b2f312c45592b809d8b71b9cd8e02b9

  • SHA1

    4868440789668204302f40a714a2a19ed27cdf71

  • SHA256

    8cc1517d549ef382509648135c46b4289f1595749e6f57ec139c47d927aa9b3c

  • SHA512

    8e03cc0a29c501de91841c2069362ae77f73a4051181349ac8b5383f138eed63e890021ff55183fd901cf5776667011e894a63f945dc8f242ac5b9399aaad3ec

  • SSDEEP

    768:XEEBVC3xkND6RLuQluKYEpj/Kb5F7C4iwD3MJV1bOWyp:XxBVoxEKLr3pj/KqTiWyp

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" "C:\Users\Admin\AppData\Local\Temp\NEW VOICEMAIL _MP3_11232022 113052 a.m..html"
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:748
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:748 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1916

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    95e9bc069340c046592fe6c9f4aaa606

    SHA1

    82d2b37c6f7974b732eeef347335ac393b07d5e1

    SHA256

    c89b1e4fa260c0d5a1d1e8ce7bfa5a36c7851ca3cc49af13ece8a0cbd560cd68

    SHA512

    1931c6127908f950802b0abd9eb82dd3aacc86d0999a4f6eab700a1a10696acab203df149d09ff149baa6600f675a015d9f8f424c276da23cfad6e153c7e1554

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\T8TT6OHP.txt
    Filesize

    608B

    MD5

    f24cfe5b5b624678974267930f575344

    SHA1

    2cb41bbf636d4d2deeea3fcba7306813428808e6

    SHA256

    31ec323bed52f668fa8065a58d832ffc25ff20d5f7e049262b26d4422c1841c1

    SHA512

    9a0f9b57ae237038e275bd9ea8120e9ee1b58891925c980f5f8205c7dedbe0f56544fe88af296d9b79679656228624572f4f84c291e37156f99d584a365d87ef