Analysis

  • max time kernel
    150s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    27-11-2022 16:54

General

  • Target

    c3cc4b97c9517f60886113ff7f28f6c1da8adedfd5a080faaee96b07e5e31547.html

  • Size

    19KB

  • MD5

    6eb08639dd9bf210018aa6958152ab56

  • SHA1

    b1ca2475a869ace507da9a034f00e86c3101f078

  • SHA256

    c3cc4b97c9517f60886113ff7f28f6c1da8adedfd5a080faaee96b07e5e31547

  • SHA512

    4534d83eb3c50e2955f034f39d6ccd6b7871823ee4a1c2c10d871350c85dd9f69e28e767d39e839b0a2fe3f15727ec23bbc71494c134917ab602ade1bca38acc

  • SSDEEP

    192:HjHxA6S8gOu8yPv+ygo1yP/01rBcjRRtC91t7cgwYwpfZK5VGJpQ2BusP7XXYZIy:rxANVCoqYcjRHGgHlZK5u9PU99lh

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 41 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c3cc4b97c9517f60886113ff7f28f6c1da8adedfd5a080faaee96b07e5e31547.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:764
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:764 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1700

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    61KB

    MD5

    3dcf580a93972319e82cafbc047d34d5

    SHA1

    8528d2a1363e5de77dc3b1142850e51ead0f4b6b

    SHA256

    40810e31f1b69075c727e6d557f9614d5880112895ff6f4df1767e87ae5640d1

    SHA512

    98384be7218340f95dae88d1cb865f23a0b4e12855beb6e74a3752274c9b4c601e493864db777bca677a370d0a9dbffd68d94898a82014537f3a801cce839c42

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3a0c31e9dee4893ce01fd791230aca23

    SHA1

    004fcd6d535ae9b7f3ab43ef5434be0e2df0721b

    SHA256

    d70085c1acf3e2d22cc47cf61897423406091d2281e60eff2c046b9d7a9962ce

    SHA512

    27defa2e80018112d52cde351ab30e207dad1c6a01cbd708508339caa37ce78ad21b9c6d5f99e962e0f8eae3dbe4c9f0962d3d10a13b71f8fd8efb7f640c11ca

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\S1341JY5.txt

    Filesize

    603B

    MD5

    b04fb53918f66659a77cd221345a35f1

    SHA1

    9c3587843371bd3c03085d7cd89fb3c93a3cd9ed

    SHA256

    4cf075ce6601a773fc9ea7528dd09cf0109ffa5450657ae5ad997df4a333d400

    SHA512

    e003fcd88eda49e35b3969c7fbe1dd32d51efd7450e8322efcbb02cdbf8db0508b743532bf92adb2a29c5320a4e5881c311dc71f06b77f6a37b45c82029f770c