Analysis

  • max time kernel
    134s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    13-02-2023 05:01

General

  • Target

    =?UTF-8?B?SW52K0JsLnNodG0=?=.html

  • Size

    3KB

  • MD5

    02ebb0c7f4c8b80f3c1930a6bff451bd

  • SHA1

    faf50e8022de2316ef4b223fe7d458005a850674

  • SHA256

    aa06709068d24029bfc846262ba41e34778047a57db674dfea46185e2b5ae5c8

  • SHA512

    09012f02804677a33532983acd84f45ee1c3e7dfd640e091368c9907ae321e8c1f661db65f7a2c761b26c8d4f85bf210b7642bc9ba7c170c016b342a3f6857a5

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\=_UTF-8_B_SW52K0JsLnNodG0=_=.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1392
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1392 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2036

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    340B

    MD5

    ea0278d3fc68809b2786f5d4cf33ffd2

    SHA1

    6c581adbb7e33bdd9957ac51faca129751f01e86

    SHA256

    84bfdaf51c6f278d84dc264b7b680fc09fd97e6f67c2d6fc09506e5eba9e9ae3

    SHA512

    ed4da2a6d55d6506bd66d08b6fb1bc0d955217caaea54163876d568146fc965a1e0d6243859b470ae033fadf9da75aebd3665bed33745d1cc4e7107f741a86a0

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\IWCKNJNO.txt

    Filesize

    607B

    MD5

    4e43dee83eeece02345745faefcf3484

    SHA1

    a73725fefac5acc5c5e0a03808086f23350bf2fa

    SHA256

    54a23b55bb4b0baadf51e04f402d3babe02646f078ad3e37c0269ab9b96c22d2

    SHA512

    b7de74e9723b442d2f59309cdbe97334b36ad7904c5d5f83b8ad72797c560ed068ba1707419a6573a4e27fe087f95e7401ff245ca1aafe568e0a5530adccfa4e