Analysis

  • max time kernel
    145s
  • max time network
    208s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    25/11/2022, 22:33

General

  • Target

    ֮˵.html

  • Size

    3KB

  • MD5

    4d6ddc350cbcec59158fda3b97742608

  • SHA1

    d1004bf94f15d63b1f27d3a39083dabbebb2ad3f

  • SHA256

    b65ff09d6978ab78ca5574ac6c80f60f032cb9ff4aab59cee7bff0a9b036abbc

  • SHA512

    75ee04309102a3ecc2e8c1db24e77af8e882f9d301df14f4b6e834226958acfab536342a8c9e27dd4d70b27ad12302aa03e0a884ba8a4cfb0649a69058943418

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 49 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\֮˵.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1056
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1056 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:980

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    340B

    MD5

    be7d63651216356f320120d2bf4e591b

    SHA1

    4014b7aa83dd28954274d03d54c15ad90523e827

    SHA256

    2c5c590ebd73e46ce76245502be55c45740507414fcb5aec3aed8498dc6a1df4

    SHA512

    5c4d97213c11a340a1166a7bcf7a5271869d192de708dabf70851cf982b2fa4df463d0793666c3589ce08673e1a1c3dfa4602159b81ddaf32c654d243d2a97ba

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\tcz8fqz\imagestore.dat

    Filesize

    5KB

    MD5

    92fd66d798cdd630a9f8c5e38d154a99

    SHA1

    d1837a1cc930d310b996eb96c60ac4f1ad015409

    SHA256

    db2dbcf0dd640a43892b9d5a62dcd802d8759c7f44e9abe558a23e175d6bfa23

    SHA512

    d5de79e2e1d9ac3f40b25cc526d520cce5450f51a50c79de93b011b56ad90729e4188161043d01a4fd7addc621b86949ea226eb56725d7013ab5f1900711408b

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\SDSAMUD8.txt

    Filesize

    608B

    MD5

    285f75db3e97c8191ec767695fc814c9

    SHA1

    6e6772120c8b64fee788a714c94ff7f41c879ec8

    SHA256

    062c622ad4d565ab4a85348fe5dc908daea661cec2b7de7d250378d2de9bde99

    SHA512

    e77b556c5931c50fcca190bf9d0016beaf7e39ba73122453df4a9f387e349a570706be6c688efde8fb7b2d61bafcaf7c3ead0ea728c7b4cdd94aa9c413c0e86e