Analysis

  • max time kernel
    1592s
  • max time network
    1596s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    02/02/2023, 02:40

General

  • Target

    NO ABRIR/Factura-8118980.pdf.html

  • Size

    401KB

  • MD5

    dd262a39abbd4398d449098834772d81

  • SHA1

    eb9c36217c09501bf3f665eac04ab48c47f6556b

  • SHA256

    0de177cd155ff3926f64c424f027cab06d7a7e52f56e3129c349ea5e1229d17e

  • SHA512

    5163d8068befcfd202944d98b4a6c8ba1712b00c00e2a735a810cd6eea132ba5aef23c36600b214b0b0bbf869da6b26496fe55ed64ceb7d3fe1b52f3c9b1e979

  • SSDEEP

    12288:GK0BOU3+06BkHl81fs2mxOa4njhiYRxz1z0:rUu0OkeVRVa4F1R/w

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" "C:\Users\Admin\AppData\Local\Temp\NO ABRIR\Factura-8118980.pdf.html"
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2004
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2004 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:668

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5ed273b3ddbf3f14c710373680a61d65

    SHA1

    a916f5186747644eabcd2f6f79647827a44dd890

    SHA256

    54f05599acb539fd8734abe4e4e4be8075bd5ae28350461c3ef8ccc99307baa1

    SHA512

    d79ea231bde161586a87d7493bfbb75f363a12bec86ac3785ca471960e37242ec819c929494d2fd841a1bf2bfa90ed90506200a4b82fdc89553088bd39e57d8e

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\mlf2v8h\imagestore.dat

    Filesize

    5KB

    MD5

    6224a723dc77b614a7940542c3894447

    SHA1

    2fcfc84b991b3c1a137eb7fbf0c4a78432d8d4a1

    SHA256

    41c6dd6a23f19d52329a0b076f60b50a35389ea60a24ecaa8a6f0b0733449127

    SHA512

    b1483d082a3c71832e5d4d65cabde07c68ebe474576d30bc111cd3a0ba4e49bd0d2020c10161049c37dc67620846c56390ad43b1a813c15d247d2e5b6730e409

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\1CF3P18S.txt

    Filesize

    604B

    MD5

    71656d1d3018dcb3d7a09b9e335d2ee4

    SHA1

    1ac8269f0827e0abb85376736587f4183cad17ea

    SHA256

    5d9262f2bf11b5fe1d34c65bba19ea7d2a3f583ba4c89db68980aa54e681d293

    SHA512

    d8ea93b1be95f8d0bc93de298a5d1ff0a1c501e9211694229b74d19a28712296f110f1acdd4a72fef89628947f7fbf73e381395f3501a3a5ef859198db929d8d