Resubmissions

15/02/2023, 00:52

230215-a8anpshb97 1

15/02/2023, 00:52

230215-a746xsgg51 1

Analysis

  • max time kernel
    89s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    15/02/2023, 00:52

General

  • Target

    sample.html

  • Size

    33KB

  • MD5

    4c18b44f52ad693a15ebd69ba55e58d0

  • SHA1

    ff0f600d8d1dc39552973f88bec75c7381e208c2

  • SHA256

    09ad1a4e41de78a86711ce32e2179bc2dd71a185729e529de2dd34d5d77fd0c8

  • SHA512

    610d6c1dd1c70d3db1905aa25b4232127dcef0a2bdbc1c1589dfec34e91ce628c0e197a1ec4ede4a79c0d932b1705363e27c10a34195fece811816c193ee3bca

  • SSDEEP

    768:ZCGjDa2IKZwtN2j7DAZOLQ8cZBQAM/VfNYbdfsS//8Nb:ZCGjDa2IKe2j7DAZOLQ8cB2Ybd1Cb

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\sample.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:852
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:852 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:596

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

          Filesize

          61KB

          MD5

          fc4666cbca561e864e7fdf883a9e6661

          SHA1

          2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

          SHA256

          10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

          SHA512

          c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          2086498fbeab86970b6a82f5b418528f

          SHA1

          6c508002c277b1e5aaf24ec22518d5ed9b7a7999

          SHA256

          c164a9d8d436a9da3db35fbe276e14d7f40c91a9bdda7b6ce800c623a3cc2bd1

          SHA512

          31608aa563b6703b7cc6380691cb74a5aa307aa9e78e658b0af210f98fed2d7beb43bf1f48c2bc02b9ba2c8d06f19ad92638a9d235df9b370ccd29ed36b376da

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\BUB44RNT.txt

          Filesize

          604B

          MD5

          0c7bb5e304eadaae033631466407a4f7

          SHA1

          5ec41c53b23c1fa378b725858f846889d3a0d0f0

          SHA256

          f800a6a44513547a1abfcb04e4e4c597b6ecd3432a9f086a1b1a99d319ee3389

          SHA512

          d768dabf491b0b820308058a3e1cd9bcc21916da711628486c7007f328fa1172cdca5becced68bd48e49de308dfd371f897cd356bd6554658e2d17add988ed3c