Analysis

  • max time kernel
    134s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    24-12-2022 08:33

General

  • Target

    var/www/html/tata-pravesh/public/images/login/__MACOSX/www.scarlet.be/_css/._myscarlet.html

  • Size

    268B

  • MD5

    d24b965a8035fd95e91eddcf45b7b866

  • SHA1

    543227cd9522eeff380025e4898c51c26216cb4e

  • SHA256

    ad95b52259cc6b62c642de4c31d47fc30a942f6783767a2c6bd7440cc1c1e692

  • SHA512

    209b5eb85e6734d8dcf7ca529120ad9f4b7f8b68f886f5fb58c0aee614fa709410bb5683125537aa704448e81f38869cef69e3a97ba8c2d09b8e78072212a724

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\var\www\html\tata-pravesh\public\images\login\__MACOSX\www.scarlet.be\_css\._myscarlet.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1216
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1216 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1744

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\UZQDWE2O.txt
    Filesize

    601B

    MD5

    e8c3213e9e16bd6d79a8fa914f9f812e

    SHA1

    0d5f8997324b3489c38f73e140107a0215b52de0

    SHA256

    9fafdc041179c378d8b587a7a8cf3c4a4f3f7201ccc78923138354e7d963cf94

    SHA512

    1232bc7ae4fd6d462fde01218a75e5602ffda5b25381c196ffcceb529666212137b6bd3f9aca32bd87e0f08c0511b9c23594f8b69211b61562b472d9406c7edc