Analysis

  • max time kernel
    345s
  • max time network
    420s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 17:54

General

  • Target

    mirserver/Readme-˵.htm

  • Size

    2KB

  • MD5

    f2a6a504c4cb797f79e3106308f94de3

  • SHA1

    a7d1a768851cd1a28901a4f2cdbc4c8fe4587818

  • SHA256

    894a0efcd35d56c800cdb80d7cc776c7c6026a2383b7e1c8c718ec53f01fdf94

  • SHA512

    1c9b9f0dc4491c108aae2ad15e2f7beca77504165546c8a4d8dfe77f8a4adb2a306b4f7e656153a03fa0067cdea555879c68b9f12c079a484f09139e0939d3c5

Score
10/10

Malware Config

Signatures

  • Detected phishing page
  • Modifies Internet Explorer settings 1 TTPs 51 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\mirserver\Readme-˵.htm
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:520
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:520 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1592

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    4d7b7880fd9838271bf1fa708913bfb1

    SHA1

    b5557817e0805b9bee39fab77399f3c2ce0cf084

    SHA256

    b9ad1c6b299289f5f6cdbc72814ca21d1fa9180bfdf77c4f0f8704346667f272

    SHA512

    f5bb3a60aeb215ad627a141341482219325451041cc11cb9bdad833d55c943f4b4905b077a9a51051699b3785c24b38afa8a48641045832638184ef4483e1b8b

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\AP2FCIOA.txt
    Filesize

    599B

    MD5

    190d7234b2a9d4a053b8c9289f11aacf

    SHA1

    fee31ec5b43e4cdf8ac7fd3fc7e22c2d4397c7c8

    SHA256

    0bd24695167e961b1dbcee73939dd92d83e488b8904ea56d02d6b7ad509660ca

    SHA512

    84b4c60e28018ccef66082c3192f00aab59c19252d3531e4f0f02e9f4c65c14dba762dde92d09c95b790373f695c5b631e6a4a52960db484db675e8c94646892