Analysis

  • max time kernel
    134s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    01/02/2023, 22:00

General

  • Target

    crashcrafter.de.html

  • Size

    14KB

  • MD5

    9e163045e5742efbfd8a55a1ed8effa9

  • SHA1

    f40d4cae3d6e8925ad3318ec6cb4c586d8bf24dd

  • SHA256

    6d2cbd4cf934b0b618d2e73bd863b951e73489def0fba0cad9d71435ccb303f3

  • SHA512

    d8e07a39b44e74e46497359d08e7ca3c82de91c9e74a7d2fc7344d67120cdf6cb9370fc3c68b9c682ae1eaaa7cd277d66ff695cf6ced4c5c4a1714cd84d39c09

  • SSDEEP

    192:Cam43juVWYgroj53A+B/MYTmfOIf1EciUDC9UDCzOXkrXU3ayQbIB9Rzwe3l:j36QgOYTfItEci19P79IFk6

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\crashcrafter.de.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2036
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2036 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1880
  • C:\Windows\explorer.exe
    "C:\Windows\explorer.exe"
    1⤵
      PID:1504

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\82CB34DD3343FE727DF8890D352E0D8F

      Filesize

      7KB

      MD5

      2968bcd90aad32d12807327e658ee03e

      SHA1

      3c8f0451b90f22796b9d751cb12ab79b841d07d2

      SHA256

      c80150fe8977ac2587cbbdb4156835a2d3b57e87f6d40966659f785f16abd64f

      SHA512

      58d00c85e796bace1c47c86df71e589972583a14a4749a8195341aca7cc560a74abafd7246fb754c4c885a5a7c8509dd53c36a5a3f23f346621bbc11f08cd66e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

      Filesize

      61KB

      MD5

      fc4666cbca561e864e7fdf883a9e6661

      SHA1

      2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

      SHA256

      10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

      SHA512

      c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\82CB34DD3343FE727DF8890D352E0D8F

      Filesize

      232B

      MD5

      25ade3aa88d0b1c370ca1d598326ec84

      SHA1

      87c9fce2083a9b70d01b6f9280beba2e4afea2e7

      SHA256

      82cda71f8e3a1b00cc144369c17ca88a81e674205435d32e843125d10d8a6342

      SHA512

      1e1e0454e00a4d5a6c36e23d48f2342a465123d76a60f2a4558dd35e273b41bd37c158f8d981ce122ed2810ad90ec557e74dc3474700e55a79e3ee60df5ff3ce

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      7847c32b27e55786a1fc88f5d0e32791

      SHA1

      d4fba5d6b90074d43cf52c13d2629c22c0378528

      SHA256

      c4e35e6b1526233868bca6ff40db8e89eb99b995c3fe9760c487c3b987068824

      SHA512

      bd13f3328660b26ecc254655c5363ac302b1af806b1079d0efcb3dff818a476addb00193a0b9922907e5c110a1c34f49c6386365598c8496a0c4f7338f9f35a0

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\H0PLZOCS.txt

      Filesize

      603B

      MD5

      47b1c136e677a260873d402d10f8bf08

      SHA1

      75e43d110296a5cb81138f3c73071f067d80a931

      SHA256

      e2708bf0f8db00a1b048600f844b9a611680d6520e68f794d06c8661815a7e9c

      SHA512

      62760295eeab9a114b7497faf60616dba3f1732c8a89cb8c5a6512ce1e959f10ec86ec13d4a81cd293b96deb9e4237a671c31a308280cd0825b519fc4f29c656

    • memory/1504-59-0x000007FEFBB41000-0x000007FEFBB43000-memory.dmp

      Filesize

      8KB