Analysis

  • max time kernel
    160s
  • max time network
    204s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    24-11-2022 07:17

General

  • Target

    bm114/wwwroot/cal/index.html

  • Size

    6KB

  • MD5

    f777b5c40475e806063c5e4c6f2622cd

  • SHA1

    4795d26677057e74fda65b103bc6ab3629e642d5

  • SHA256

    e2a542c8ba97915a4f57ffede43af705232daa1f5293467c4b0e166a5244180c

  • SHA512

    50f848d724f8e969e414620a1ba21c7e19c6804c5e3f9e6ce795e6489db649b12e6888440918e8390481bcfd863e768015d4f3fdeb7c04e64a433d6c4c9b64ad

  • SSDEEP

    192:SIPw1EQdM+nvRUN5ze5wx5qO5N5Wze5iXs5hT65WFrALG6oR:SIKnvRUN5ze5wx5qO5N5Wa5ic5hT65Wz

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\bm114\wwwroot\cal\index.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1776
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1776 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:872

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    340B

    MD5

    0b48e97ca4b6085b3f48ca35872a2111

    SHA1

    353d9b6cb1d2a10562426401f7a8d46e60310cab

    SHA256

    70e78eceab04d80f4d905475b52f8d3b3c4b2fba6201e912c6ae9b8f29c0a5b4

    SHA512

    eb4edd175fe35b27650274df5882b87f6a9c3bb7b06b2c5a2d35fb8dd8c8d66ca9839f4ed70544221f741d93e2b939fa1b920d05b8a01c5d047b9b88636a7bc4

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\BSUGYUOR.txt

    Filesize

    603B

    MD5

    7bbbf3b854c2bb3941a716d7901b755a

    SHA1

    eff6e34c7def008421c34b551e14cfb8955d9f25

    SHA256

    516cdb8ddcb77e9d09b558c2c7cd286c19e5cdac6067a17ea6b4dc8af71250e4

    SHA512

    d13b0df1f813216cb5a4cd58d726277b87faf2859d720278879b415b1bd3967cb0f7f325a1db4ca958cc95d64ddcb91bf58cf580b9e54122483e530719c6df21