Analysis

  • max time kernel
    68s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    08/02/2023, 17:28

General

  • Target

    B55306E89623CF72AA8FAB043C6E4C568328D85268F7D18EA450A83EE1AF091F.html

  • Size

    17KB

  • MD5

    632a5d0ac96b3f3f3a845cfbf1611480

  • SHA1

    ece23645b3cc152835107ea8847abc48c8a504fc

  • SHA256

    b55306e89623cf72aa8fab043c6e4c568328d85268f7d18ea450a83ee1af091f

  • SHA512

    03fafb42e0ed6ba53f034d40819e88468b57948e29f54e8cf3406ab4a23aa7b75d4327b21ad4542faeac8e9c13bba89ba2639a22d2823dcc8e7817d4e48a17b0

  • SSDEEP

    384:+Xx9OeKvg4SYC2KvhxwOKv11+Bzd6FTNHnV/VH:+hrKjjKZXKKZd6FZH

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\B55306E89623CF72AA8FAB043C6E4C568328D85268F7D18EA450A83EE1AF091F.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2044
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2044 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1652

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    340B

    MD5

    1331f8dbab656b9d0e97a2eaf459b7f5

    SHA1

    f30f2dfa38a642c62d26f269327c1cc804606aa2

    SHA256

    4d7c3d60ecc44ac70e8f8d1a62048dbc013345b609c2201b5630d5c93386177b

    SHA512

    1a1baac01c4a33f1fea5b67e03df8d9428a4c20c4e6501205670bb8897b755e9ae9211814daf3dbcd36a1c46f15eb53d8593b45bf58ccd4fab65b2d35f5a6b4c

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\X4IBM1OT.txt

    Filesize

    604B

    MD5

    01325b50fe604635d575a6f3f321e673

    SHA1

    fae855a5934e268634fd8409ef808c25458c55f4

    SHA256

    c1f70cd7819750cd1eda4d2bea73745ef4005c4ffd2d9215a02a541e5b248030

    SHA512

    73b19c7c80115e6c748cb10b455f97a89cd94e768823e9e1b1bf2bb0d680ee0dae23cdbd082c75f9f65fc0b506d2634abdb1b8fc30fc83ad1e6819242e394eb2