Analysis

  • max time kernel
    166s
  • max time network
    172s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 19:00

General

  • Target

    e96db402d1838ec664f7fd0d146f86161c981c8445b13178bd7779567fbbce59.html

  • Size

    110KB

  • MD5

    40ddab10ca3c8b92aa4ed464a03f1c70

  • SHA1

    96209e28499af68ab680369a541e0b7e492d68c7

  • SHA256

    e96db402d1838ec664f7fd0d146f86161c981c8445b13178bd7779567fbbce59

  • SHA512

    f9566455aa95e160774a2a956964493fedea15c6ff23aa3e6c0894bf07238bc52f68c94943547f230002d5ac44838400c4caae0be57861e755e504b3decc65d6

  • SSDEEP

    1536:MyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy9dGCsQSz:MyfkMY+BES09JXAnyrZalI+YQ

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 52 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e96db402d1838ec664f7fd0d146f86161c981c8445b13178bd7779567fbbce59.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:896
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:896 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:1984

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    340B

    MD5

    0afcb89a1b59884626b581d3b01545a2

    SHA1

    0ad37a08d10ded317dc0d67030d177610c668276

    SHA256

    9127d84f346f9b2ea6e0a5b70b191d8e63575dba49837350fbd326765f2cf448

    SHA512

    7d87f5d04ba9d7f3d8eddc9bb815f2e8b01f98b1cbd7c3dc4fac6ae5b460f210a414d164bdc846753b098e6490fcf4a37abf440682af3c5e516c81871cbeb99c

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\tcz8fqz\imagestore.dat

    Filesize

    13KB

    MD5

    feafe109f89322aa3dd0abeeaaf1a209

    SHA1

    7959d77d34ddf37ac0c6d3a0f34d9a17c91108ee

    SHA256

    5be6619d20a191c258d1348670259341f2fb7aceb534db4d409e201060a01da5

    SHA512

    7ec1cb0a3e99f45350742e527cbd6758b1b7f40978bb9fba486caaf32fce4680167d80e6b5902b8dabf6d22473b05427496a1c3088376ef521facf9d6409935e

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\0V9AOBAL.txt

    Filesize

    603B

    MD5

    2afba528e80f0974c8886fc3bd5b99d1

    SHA1

    e5462be39b25d156675df75d179247b84579240a

    SHA256

    9edb499b5299d031e50ee2e65077aa7fe00e81067b347ecc5f4189bed202c355

    SHA512

    9ac50946f1376c2108b39eb0de9ec4523506bdbbed4291f1feab8e7d8ad22942bd218239c957204d69f7b2e5cc159a35a9d23d359a4d7cf0670f306f3eae5764