Analysis

  • max time kernel
    151s
  • max time network
    164s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    25-11-2022 23:56

General

  • Target

    MirServer/Readme-˵.htm

  • Size

    2KB

  • MD5

    f2a6a504c4cb797f79e3106308f94de3

  • SHA1

    a7d1a768851cd1a28901a4f2cdbc4c8fe4587818

  • SHA256

    894a0efcd35d56c800cdb80d7cc776c7c6026a2383b7e1c8c718ec53f01fdf94

  • SHA512

    1c9b9f0dc4491c108aae2ad15e2f7beca77504165546c8a4d8dfe77f8a4adb2a306b4f7e656153a03fa0067cdea555879c68b9f12c079a484f09139e0939d3c5

Score
10/10

Malware Config

Signatures

  • Detected phishing page
  • Modifies Internet Explorer settings 1 TTPs 49 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\MirServer\Readme-˵.htm
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:980
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:980 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:456

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    104b3b01235684348cdecbf252cd8058

    SHA1

    9f89e066bb6a600c53eee809f4be017eada5f27e

    SHA256

    5b6f244dfd8684c0805e1706c9f5bffd8a990901f373db23b57fd2527cdea4b4

    SHA512

    7198f9c46bb6fe53d37e9f44ca5e937ff5bead12b06242073140a5572a8916f76a9ee15af7d928535d20809b99b98f96c8387f4aa92111eb73d35c9415304121

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\XH6CPUPG.txt

    Filesize

    603B

    MD5

    1f83e6f4104d24b8cb75524689800a6a

    SHA1

    5aeaa9aeb1be2546f86edfac7abd2fd778c9f7c1

    SHA256

    aca480d4874701ce23a4144eaede983ce76714dc9ebc2a243d463f3fba56b190

    SHA512

    05572b42281e800bed543e1b99f60e60d877bb3ba415fc23924e11228f33bc73fe0380a21d29b1f8250bcbc73bdfa57d0dc1d4db1679fce3002b8c7dcaaf3560