Analysis

  • max time kernel
    128s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    29-11-2022 12:04

General

  • Target

    email-html-1.html

  • Size

    806B

  • MD5

    efc80305a5bf1390a744fb3ba0972d66

  • SHA1

    ffb585c62df7eced762980c55f694dac6e73218e

  • SHA256

    c95105d51cd8b23015d9ddcb0a2e6347e947bd9731bd5b4b0230f7a4d2e63b53

  • SHA512

    19616f0581ded2d09fe8b7c466d7994e76e40ac1d3bff6257eb6824987b7a9299cd8dc292c4b7faaf14b11b33ad5011052cb112cd12189ce948332465218e118

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\email-html-1.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1444
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1444 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2012

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
    Filesize

    61KB

    MD5

    3dcf580a93972319e82cafbc047d34d5

    SHA1

    8528d2a1363e5de77dc3b1142850e51ead0f4b6b

    SHA256

    40810e31f1b69075c727e6d557f9614d5880112895ff6f4df1767e87ae5640d1

    SHA512

    98384be7218340f95dae88d1cb865f23a0b4e12855beb6e74a3752274c9b4c601e493864db777bca677a370d0a9dbffd68d94898a82014537f3a801cce839c42

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    00082736d7219eb47c276b040cc321fc

    SHA1

    1b3317671ff7f8efd4c2b5947b01c961410ddff2

    SHA256

    f4a4cea797c2d3d3e8d6ac10bd7aea537fbb6ff75c069b76ae4896e00314fee2

    SHA512

    a9fca8f13dccfd5132044a9f0f429f1fe8a97ee5cdac436fc00e435e45adc01712687a19cd85fe0cdb3a8d4434fec44dec0ba40e58da725c38ad3c3c4267fc18

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\J437A0HG.txt
    Filesize

    608B

    MD5

    4d23e022971e6d71e67975ac3ed2fd28

    SHA1

    d3688f29e7c8ec04ec453f8e23c45d6077589f17

    SHA256

    8a4a827a7776572c8cfd8102cda03ed4e3be1b95214185784484392e5727cf5d

    SHA512

    097240588cb66237c7b14842a8c7b3602baf752c282b1148be73267f201fb7f6e3b93df26d79668fefcbabb2d241a430442a14bf3aa18f53d333f51d6c7b549c