Analysis

  • max time kernel
    67s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    07-02-2023 07:57

General

  • Target

    AWB202232894.html

  • Size

    70KB

  • MD5

    f49fd61f7e2414cfcdd14cd9189f9b70

  • SHA1

    23e967beb2205881d6769b982f6f7e1153293d10

  • SHA256

    54ee4f5a56dff44bdb521d87a09b3b07e1681aa32f6ef618df813a1e53038ab0

  • SHA512

    8f1dcdeeeabc705ca90b07c2ba75fa884bc37b8e33d7af0d9b1539ade25c5db49cc086b732f513b8c51ebc306e212ab4c40b4ec9b8d273798bc09f34ffb76049

  • SSDEEP

    768:M8+Hh77kuui8Jz5fXtqJXezV+z3EcyGzozmprKS+axVUsrGEKLHfxLBmzd2RSZs6:P+H1kuU5fX7V63pzoze5v0C

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\AWB202232894.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1680
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1680 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:848

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    61KB

    MD5

    fc4666cbca561e864e7fdf883a9e6661

    SHA1

    2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

    SHA256

    10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

    SHA512

    c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2b51e2f5bd7316db80cb0597568f20e8

    SHA1

    07f94bb4865eb6cd322666b61afa6b208df35009

    SHA256

    d703f4b70d6a8ff3f0a205ad0f56b28001af898efdaac92937e1fe59010abcb9

    SHA512

    b5afcb572e136aef42b571f4152367c109d63d91cbfbceb6f28602af4b858b09d00e46d3a0620739010dd575534f4ac57026cf1be1ca18a3866b4cd6a498a563

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\033ZAN19.txt

    Filesize

    604B

    MD5

    7895d3e8f95455d2aebb0ef38c24fc81

    SHA1

    15c5f47b50f4ad1cba1dd980f282e83571489c7a

    SHA256

    3091bc106c0ee2898d22420466933152fa0f5d0229c239392170bba15f297dd5

    SHA512

    798e488ce026935b8067b47bb91069a2ae3099b32d2a4df753b6a868a73cf47d738e3294ea052d60e81e99dda46e95f5ed418319399fb78470a1d0c507f73b1b