Resubmissions

19-12-2022 09:03

221219-k1jlraef58 1

15-12-2022 13:27

221215-qp27lsfd7t 10

15-12-2022 13:23

221215-qm8xdacd77 1

Analysis

  • max time kernel
    134s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    19-12-2022 09:03

General

  • Target

    Cancelation 0163560 Dec 14.html

  • Size

    333KB

  • MD5

    71b7bb5cf66f666c36dfe9c591ba9662

  • SHA1

    94b92cc5978d5bb72632bd97d65c5ad6ce195b03

  • SHA256

    1c7b03124e95748f2d00745e2adf1e9e28cb8ec524e8c14e56e92dba2d145581

  • SHA512

    3afe873800c1a138b31a0b2e469c874b51e333575af844b6733fa6a9c9b63f064f3e35dc15d74d6766af5fe91fe0e6accc9db45878b70841e4dacba6114656e5

  • SSDEEP

    6144:ZbHcjyHkPdw+2pY1AWq/z2YW8mMo7MUj2sXs7W5yAJ:ZbcjyH+1iaYnq4Wkm

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" "C:\Users\Admin\AppData\Local\Temp\Cancelation 0163560 Dec 14.html"
    1⤵
    • Modifies Internet Explorer Phishing Filter
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1124
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1124 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1496

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

2
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    5ab99507cfb6884538363eafc8d22a9d

    SHA1

    f18b3fa5aac0716852ba98f3a20a71f799920ff8

    SHA256

    e97c3c7b96c1182daba19391bb7b3f2187949522d00952b9586598d4c4acfc82

    SHA512

    02ee694977314b49f53d7f5dff8fff0b53838093f2784693dd361420ddccd716e4a52ff806252e7ae9925ffc4138c4231209246925160a1f81f6c9449d204151

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\GNVF12DR.txt
    Filesize

    608B

    MD5

    7a26e08b2c55dc8af8b221075d1bc03a

    SHA1

    215e5ca0d2c7cee7615cc7b887fab48f8729cdcc

    SHA256

    b98eca7a96466c83faca130da27af5b49dfbb8564f1cd3f1e1188b88c4daf025

    SHA512

    4324c0ce43acd169ad16fb23a15cf678b486d8dbc83aae47541d2219062480b65ec2609589f90b9d048c5996183fe4c0e28c506ce2f6f0fe9382eba521d0adb4