Analysis

  • max time kernel
    122s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    01/02/2023, 02:00

General

  • Target

    ORDER3233###.html

  • Size

    2KB

  • MD5

    cf6e8fd228f887444a2e5cb2cc20ed99

  • SHA1

    6c52409956e81b865b2bdcdaac0392971aa4335a

  • SHA256

    18b7c45cbbf3a2753b2bdd024d109c6e2963840353a520ea5b22e2b763ce014e

  • SHA512

    039456e19670bd82135fcecd0cad7d0e3f1b0cc84e78c6d634f659999d438e72e9aa3d3a4e674ff752cc51e942f395a5810d98304a7a3f6fdd7772e8c5c85c6d

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ORDER3233###.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1884
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1884 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1644

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

          Filesize

          61KB

          MD5

          fc4666cbca561e864e7fdf883a9e6661

          SHA1

          2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

          SHA256

          10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

          SHA512

          c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          99567844169a447456a7a553ec4578a3

          SHA1

          8b0698fbc8af75bc3453090323f6d7d1188b4545

          SHA256

          c63196e43dab867be42ed55d4a0424dfd53a827d318af132a0c6da551f247f37

          SHA512

          4aae7efec457aad54e674c5a3b11fd1cafc370db2c0a5c425b60d15f8a7f198c49e6b2e8ed22e4d648228cb6a3dfda62242a7c387f4bbf1b4f84fd0fc2d9330d

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\M3BI2UTL.txt

          Filesize

          604B

          MD5

          845bc31f68a4241d3376c02738419b07

          SHA1

          6607e1b3be446a6e7b032c7782778449210bb467

          SHA256

          01b7ccb0498f7049a101fc344cd48dc9ff69d4d5e93ddaa4a3f93e209cc0225b

          SHA512

          b0e900cc80e4f1642d2e8e6e645e0df4fca64867e011ac7a12b7798375953943557fa69edd35ab21889c9f8a647682e0048140b6a38f6cb0aaacee174840c382