Resubmissions

22-01-2023 19:41

230122-yeeybshe98 10

22-01-2023 19:30

230122-x716lahe43 8

22-01-2023 19:26

230122-x5qxvabd3t 6

Analysis

  • max time kernel
    148s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    22-01-2023 19:26

General

  • Target

    email-html-1.html

  • Size

    3KB

  • MD5

    f0fe336642eeaa0c37b7094fd1494905

  • SHA1

    69e61a0c83aa7603e4b09e3070da6f17548402d6

  • SHA256

    47c1a0979af792d31e74f1159ca97836d3bf8f3ac37e2bec940aa93aa1eda6a1

  • SHA512

    b187364e4150b18ac90d306d4ba04eecdb24f16f0c06e4e42c1c36f50ecacbcc6ac10440d6575e78bdb75e92b1f5cc6a5c53a6ab5a5b24411029c011092d4886

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\email-html-1.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1932
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1932 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:852

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    340B

    MD5

    b2f8eb69f4690c42361a0c05551cb271

    SHA1

    23b71fe8d55c6d303a7438a2d12f7b6017a425d0

    SHA256

    cfb91665d5d1a469b79a8c71a84c45589d7a8112fe0376538ff6af5f3fb7626a

    SHA512

    89d2e673c2616e1dc888a24e8e9d284576472d8c872fbf183747ccdcbcafb3a04bac51291e3b9511aec4861a0dda5fa37fa5946467c7eb8aa41443f774b6f124

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\8RD0YLVX.txt
    Filesize

    603B

    MD5

    a67d2035ab5db98cd1b3b1397452ecf1

    SHA1

    52b422a5a337df33527e88152c9ff033ee827147

    SHA256

    d2aa80dd1732d1c4c74bfb44c266b304be289fa1893ca108e955752fa5561029

    SHA512

    6a2917b06d4b2d8bd5d56e88f1e10eed6912b47d7ac6671d660d91affdfb4fb83e589619275de35d282e8d58128131ee7e76122a88517364282ce2209cf88b9d