Analysis

  • max time kernel
    124s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    18/12/2022, 09:36

General

  • Target

    762e911f479d05343d89b4f26cbd48b92ff7d684.html

  • Size

    123KB

  • MD5

    9027a8eec2b4adbc2bb61cf03706a248

  • SHA1

    762e911f479d05343d89b4f26cbd48b92ff7d684

  • SHA256

    8586e7f910bd6f56bcb8fee28b5abae4cb20be343e5e67aae07b271ca67493c7

  • SHA512

    5cefb3a64588cda7107cb723d471611dbc1c13f5d97640bb5ab3c59fc246fee9fe9d7db782ea8565aed7eb1c848221dcac349d81448b2b467e742d7ddf3095e5

  • SSDEEP

    3072:dnlA/tFywT6t7FuMT54a/MZEkrS2dCR9SoQJoTIZVvVN7FXN3lh:5lA/sH/MZEkrS24RcoCZdVN7/lh

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 41 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\762e911f479d05343d89b4f26cbd48b92ff7d684.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1672
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1672 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1652

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    340B

    MD5

    434dd3e9f0b59a5425952fa6b7f958e3

    SHA1

    abab3fa0eae7c68396be46dc5147554c30d4bc3b

    SHA256

    fcc2b5b3f7c79f6fe06cecc92468b42f040f36394b71a63650af7c64c570b793

    SHA512

    2b65eb77ce0ff24f15795f62b6ee70b4d046fcd7c902448328aeb08fa78757cc3a49c5445422bba2f9038c6afd0f4a65600c2c8b67fde062ffb51c25755c87cf

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\63ED8X4V.txt

    Filesize

    606B

    MD5

    e355314f509b9b9e3817193cf2e338fc

    SHA1

    10bfafbe35178eca88a368ab50ebe23a39956601

    SHA256

    72320e52d71915917292736a6418bbfbd9cb6354e9b74aac97dbffd4f675ff31

    SHA512

    94014d1ae785d9c485682eb8e9c4da90d934bfdb2037e0a83f31106b7f3cbeff3806d6d2cf4fa0fbc961d9e9092d4ea5262a410555ab28f2baab8b0972024e7b