Resubmissions

05-12-2022 15:14

221205-smedwabf89 1

05-12-2022 15:10

221205-skaynsee5w 1

Analysis

  • max time kernel
    144s
  • max time network
    169s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    05-12-2022 15:14

General

  • Target

    PDF File (1) (1).html

  • Size

    22KB

  • MD5

    362c4dad867f3fdf9fe3c4808fa20215

  • SHA1

    2618e47d94b09eda56fb436f614bd74efd7aacd1

  • SHA256

    3f1779948e5d73da23837ef4f39e285b9d6bd4a029589bbf51e62557b3abd2db

  • SHA512

    b4c27f5900b0b220847ab7bf5d8f9b388fd70e6df3e38d33209f572575a2fde9621f7d377d3df26228cdaeb67464e8b37413f0bd1b906f354c942f0f427f35a9

  • SSDEEP

    384:hc0s1A4iX8i/VyvXxBmjiIOJGsfVNEtND6NSuNBto8UHAm9VN8tNPRNvtj8UQtAl:hc5ChsvXxBm3XjPeHjvDZAFGE2R7v

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 42 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" "C:\Users\Admin\AppData\Local\Temp\PDF File (1) (1).html"
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1976
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1976 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1120

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5f3c62156b021516defde1f250150250

    SHA1

    571ad80188b3f9582f55c954fe9836f973bafd35

    SHA256

    d9d9c9ddb000defd5c9ccf6edb11dc7822296d6ef06756656d6b7f5963c26291

    SHA512

    daa608fc5f38550e4e45a1a28b5b547c45b05a34d1dc097e6a1ff455eea554c5326d1508816fc1d15f7e0c4401a1103ce5b8f7d8a0b648ed89295edac8511911

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\H977T8A2.txt

    Filesize

    601B

    MD5

    6335058e527c4c9754fd1c89ae02aeb2

    SHA1

    ffc945ac06e978f2247a443fe89d65ccc967fae2

    SHA256

    a00ceff1ad992011e5a33a5bd98d54bf656b5f3c09d2fb97cb4caef8fc2adab1

    SHA512

    cc88cccaea1ff493603501dd5d0d4e7b7bc10a931bd90632b65e49a3add44bcdfff034c36d3b619ccaf34619c922a1133bb21af248395a230cd5331e79923bac