Analysis

  • max time kernel
    134s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    25-01-2023 11:11

General

  • Target

    login.html

  • Size

    6KB

  • MD5

    7ee8f195aa4eae5b4e0436bb89318339

  • SHA1

    9d7a6ed819dcc0f0bcbaab73abab852f19883c8f

  • SHA256

    73901a2c735ccb071f51daf11546f43f7703d8fcf00fed7f643a03d0f712f46b

  • SHA512

    69a548cac3bea75a8b6c34ec0b993f40f9c0068f41352d558c2e6c00e59e86af49e5f70237771104eddecc32f3be3525fa35d16636693e0c42332f47f5f25593

  • SSDEEP

    96:EDIjSam4l/NnntT/kG6/pv+nt0KAoIZpEOOI:2IjSam4RNRkN+t0KAiOOI

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\login.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1264
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1264 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1640

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
    Filesize

    61KB

    MD5

    fc4666cbca561e864e7fdf883a9e6661

    SHA1

    2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

    SHA256

    10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

    SHA512

    c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    a496aa75014b7dc777f2cfc133b434be

    SHA1

    8901b4a009b5685699e15c077c6dc55f9934dc1f

    SHA256

    8199f5ea9ec1efbd35be19efc888b15f0cd83426e77434aa6500856c95f65518

    SHA512

    bfe6db53dbd5122fd9b18980ec392dd446793eded79981f5579dff0e014e442c654f9594542edff3844c05c947acc31f1b1c114b586b059dc71fbbc0ff7784fe

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\M9Z9YYOI.txt
    Filesize

    604B

    MD5

    e26aba935d268cb521754e1c3edb161d

    SHA1

    b1f0ec4612b30d65efc3c56f67ea9cf95fa92829

    SHA256

    99d489c37425da180fb8a512e782046cee22f9914d01deb188187749dd08799c

    SHA512

    b83c4eb9d6322544edd308852a40ff57d3db45b7b9252398359f559c92f80f57a406f9a627570d8f788e816408c932bafe0de430cfdbe1db9038ed20dadeb317