Analysis

  • max time kernel
    94s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    02-02-2023 19:54

General

  • Target

    ATT00001.htm

  • Size

    688B

  • MD5

    42d2612b202bb24ad5c0b829a547c9e4

  • SHA1

    a3da7f90969b3b92e1d0220ba3c0423fecefdcd4

  • SHA256

    041cec6341557588d590dab3ff934f5fb54b0b9766bd0500b38d833fffd4e1d1

  • SHA512

    81ddc7d3c56ce7dc45ba77077abcb02191c486f8a5c15dbfed3b15048981663dc96a75d49fc3c40f60f4c807f318c59103dd90834ec6d6ea906ea921b5a54b36

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ATT00001.htm
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1264
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1264 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1148

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    61KB

    MD5

    fc4666cbca561e864e7fdf883a9e6661

    SHA1

    2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

    SHA256

    10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

    SHA512

    c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    aaddf22737e110d1444b383609a8d121

    SHA1

    2d9ea88be4a4b34589bc01b3b6378467539115f7

    SHA256

    a43d5e2ce41a51c81a86afb328ef1b1af940104dad2451b605c9adb18e6bac3c

    SHA512

    780bf8b3b2dd678f4ba43ebd368aa46b627877e149bf10dc77b224f560037166c42e60e523dd0f8065430e3060d97c7b4f1c1b3a6f59967d23a35ed591553724

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\XGTNI28U.txt

    Filesize

    608B

    MD5

    1e834c3ddc6b6b43dcfae94df46dc0b9

    SHA1

    4be89a0581da17a639cd7c4665383b4d7d088ece

    SHA256

    74295716d96585b06c2bb8edfca217509456d8b6d80f1bfabdf50a70555f161e

    SHA512

    2f60740ea673f4ae6d495f0f4e44deee5ea797dc6ff6f705663c669daae6acff37cf0a77dd47079503bbd772acad735eb883bc9358ac97d70a67d99b36febe6a