Analysis

  • max time kernel
    149s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    09-01-2023 15:52

General

  • Target

    SCAN_DT6281.html

  • Size

    1.2MB

  • MD5

    f0b615c8a648722fcdcc6a1f055c0bc0

  • SHA1

    5e6a22b9044c9d684a3392391b23a762182ef5b3

  • SHA256

    4efc4cc462a27245945ee90465caef589b71c41b33bf6d24ce2e6f74b75fdbe7

  • SHA512

    9a5de209c7eaa3f0766fa0c4448302fd778401da9720347b5a4e5ae10eb6e6a065b7a86391c8dcac1d38f998ed4091b6a21fbcc3ad8f717e1e16737b757e2d75

  • SSDEEP

    24576:dcEyMGTCmlO13OxIZGrntxnlvdcA09Xq3RzKJzIcZBENivdcAEYMfvG:qB8eDnt5Bx+AUBDxFMfO

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\SCAN_DT6281.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1636
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1636 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1828
  • C:\Windows\explorer.exe
    "C:\Windows\explorer.exe"
    1⤵
      PID:1620
    • C:\Windows\system32\AUDIODG.EXE
      C:\Windows\system32\AUDIODG.EXE 0x148
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1852

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Modify Registry

    1
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\W6HPCSC0.txt
      Filesize

      603B

      MD5

      42fbff4a5cd0e1117c4b5059b8a5767a

      SHA1

      bc7caa1193ff53c9c8fb5965c18f3859412e3b27

      SHA256

      a0536cc310d4077ef4cb19d39978e639f9e2f8b05ab1340b90ad1441cd8a15aa

      SHA512

      6506ff8a1bddeabdefaad3b0389e0db1b832000356feb9841c7c0924e42f1e049b5afa9f428fcf413e9ecda9df7a8a41335912176c4984de1e6a1fc2d446ef5a

    • memory/1620-54-0x000007FEFB821000-0x000007FEFB823000-memory.dmp
      Filesize

      8KB