Analysis

  • max time kernel
    277s
  • max time network
    312s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 17:54

General

  • Target

    mirserver/LoginSrv/Readme-˵.htm

  • Size

    2KB

  • MD5

    f2a6a504c4cb797f79e3106308f94de3

  • SHA1

    a7d1a768851cd1a28901a4f2cdbc4c8fe4587818

  • SHA256

    894a0efcd35d56c800cdb80d7cc776c7c6026a2383b7e1c8c718ec53f01fdf94

  • SHA512

    1c9b9f0dc4491c108aae2ad15e2f7beca77504165546c8a4d8dfe77f8a4adb2a306b4f7e656153a03fa0067cdea555879c68b9f12c079a484f09139e0939d3c5

Score
10/10

Malware Config

Signatures

  • Detected phishing page
  • Modifies Internet Explorer settings 1 TTPs 49 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\mirserver\LoginSrv\Readme-˵.htm
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1356
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1356 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:544

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    340B

    MD5

    da506e46fd146b43e892de619a9ae54a

    SHA1

    4450c3eed11889ebb68042202c6f83d03c1126eb

    SHA256

    45c4dc0d9179e7a60bc5c98bee342b68c7999912cdb37c98960ce29dca4d1771

    SHA512

    ed0fc81ea96031677c20260abf06d240e9ec0db6312730134ad9bc4d2fc930f6cf63024b077309afe7b18872cb9254f5378c5cbda56ab04d4c545cd8b0d46b7d

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\U3XL6PHI.txt
    Filesize

    608B

    MD5

    10ffc83c5c528858073575406b62e998

    SHA1

    97554e5b1ac17612f9e923c472f234d96e1f1d7e

    SHA256

    fed7d05b5ce6044009f938bd0a7edb79747dfa78bc033da4c495ce2263641b20

    SHA512

    31b89c9cce606c89001b95886c08037d96a8eab0a2a0f912adcd587ee6a5b071c175803a52ea055d3db4672b19ca98c8e87088970385b4dc5dbecd3e1c7d259e