Analysis

  • max time kernel
    69s
  • max time network
    76s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    21/03/2023, 20:48

General

  • Target

    SCOTlABANK.html

  • Size

    11KB

  • MD5

    26ed30d23905cecae1fd736830415325

  • SHA1

    c78963d3ddbb6537f7f8b90c081f3ce8726f2fec

  • SHA256

    9227d66005bb476d3113325d395313b9d6260438dab016905d5a3960b463ffb0

  • SHA512

    3ebcd1221af5a28d6b56d8f34cb9312c8f3e1eafa557913df5911418f3a689cb3c7a894dfb256e56f710abcc25b921c1707d8e8e03ea43a9410a72e8e9f6b96d

  • SSDEEP

    192:O4ftRj+oPUDkG2pioA+00msyfRFRI4LIdvNUyYz+rinx0AEUy0nuUyC4tUygpLRK:JtRlUDepNA+NmsyfRFLkQ6ix0AVHtRNI

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\SCOTlABANK.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:924
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:924 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:688

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    61KB

    MD5

    e71c8443ae0bc2e282c73faead0a6dd3

    SHA1

    0c110c1b01e68edfacaeae64781a37b1995fa94b

    SHA256

    95b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72

    SHA512

    b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    61KB

    MD5

    e71c8443ae0bc2e282c73faead0a6dd3

    SHA1

    0c110c1b01e68edfacaeae64781a37b1995fa94b

    SHA256

    95b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72

    SHA512

    b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    34c162461d2e5761f1af1d2df6eebdb7

    SHA1

    26437b674a68b4365b481faa4b95249667770076

    SHA256

    061e93e758b01e39ae37d5bd360dbaf50988f04198975267f1a9d093afdd34d2

    SHA512

    57a8109ad1e7a31aa3100f98c12b9b5c71252cc06f4c5accf23cc46dd30fe9a62eb974dd4320ccd47a2c1320a5a993606f8f47469b574feca8a76aea354968b2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    32a615ab9d556526cec57fd891b3c11a

    SHA1

    079d73e596bb99933923c4a7171692724587ff02

    SHA256

    0207ee11f22d14e4d0df83e521e75c3981d635ebdf50d9b30879c9881f291a0c

    SHA512

    ad4b57c414cae9e4d999988a407ab07703c72b00f9ed288d2ad42946ff8a6e59e4497a856f81d0c15072ad56df9fa32c7d786c2bd3f2dc5ca6a9c95f8a25fedf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    70969cffbf5f970aa044e4f5fcae9f35

    SHA1

    153c58be9d52595beacc2a1cd91bdccc2eac537b

    SHA256

    c35f20d602ce4e3163972e32bdb0472e25e1ce875ca1543894691f41f8f39cc8

    SHA512

    5af8de9c0d14a3f46ddee931838d92d0143d4ce82099058e3991a1f15239dbbaf54606754ef2b9b1df06b8aeec0c5058f3293b24138c15c3dba0bac234ccbaa4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    559ce01d85dfcef2fbf5dd884497d0ab

    SHA1

    9699a8f01d10424babb01e94aeb76fde79905c43

    SHA256

    fc2d65d764b938bd5efa6a771aaaf13db2ce7266a6a393b05c1ab61635e3191f

    SHA512

    cba164de0a038b27f04c0ca64411e342703128bb6011136ddac4485fadf1b59d658f3452d4484635037270c7326a604e36c357268c82cb9003d2a96077eb6bd6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5d462d43b374428b0f161d4a9003f010

    SHA1

    bec86be9a14692ace01d2cc77ae341e6f7f11a61

    SHA256

    8f284796eb7b8c2ca8a3e7cd0d8400ad46d05ea858b031613adb3386842ae730

    SHA512

    3b7b2dd7442ad09b81c3610665551cfa111c5ae36dec1b00616e2128ee7df2e7c5ae1eb61195989944fc2430e48c1f51cfd2277a0e0f7fff810efb18d76b8984

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9c1e1debcfa27ae40e722011b6f5660e

    SHA1

    3dc2ab14ee043a68517b6eeee3d6789f901b1a37

    SHA256

    84efddd5f5c6c9ad55348e057dc9d494321d04fc39df33f68f64a05fcd98e996

    SHA512

    9dc039b834dd21d3edc9e41a00bf965e32bdca31dbc769083a940b941867a1e58d564b0e8458171cf6d867b162b3c5c38eceb5621b26965407b9907f128ef322

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f5d457665fd1bd73c85cff90a3684f08

    SHA1

    b6ff7696f6a92373afb2ad45630c903b4ef61ccc

    SHA256

    143fbabb51f6b2563efecc93b19674e3f37c4eade954b6a9023b51057746deb4

    SHA512

    bd7c52ef39089557c94b972da088ffbc3cbe76a3617e69ff4c71b2b9606bfcdcc94c4bd882a76957e65fa5bd7b4391b23d5debd3f0bd8878414ca68145f6624c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b109d1c32b5e3948f11533f51d969e0b

    SHA1

    c456e303eaaba6d765fda4a42f79facb65cf2b15

    SHA256

    5fc1b1f9ff1330c8c24bf716975236a9ea87c09943c4e7838259d9a07ef06939

    SHA512

    e4196983c4276d3b9052a633114fd922c3ce0ced3dcbfb2db76b8cf82ea881124fb604a77cd1e697675ce86a63eee73ae37d54e5cf081512042b1fd8b337419b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fcd837647843c83695440b4b756dd15a

    SHA1

    efa91019e81382a3a875270eede0d30bf3a17572

    SHA256

    19099458c8519b0c1be60d4e0e9f93e604dbd60cd07d2be7e296acdc2f8c4773

    SHA512

    215bf260c9a16baa49e1dc47320137d278ae21d6fb476a175ad320f46660fa4444e3e70a8210297bfa8671dc74050cfe7310546df19e042819f4d8288cbf4655

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    09508bdb3d5ba74676089e95eb2825a9

    SHA1

    b9e5e05605640205881fe4e6ffd26afc6208c720

    SHA256

    2e3a07fad56cebf5c74a2deff88382a3bf01bb0bdc609c1a85b7e4b08dc03091

    SHA512

    010bdcb4fe9c69d865ee4e2aa2111d680bf5c8c06aee2671d9e558136ee42e203f07cb2b71a1b67bf0f0fc80febe0f84fdaac203b80a4c84da442ba358839f0b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7c6095fd8068db617c898fdf4ac53021

    SHA1

    3511dbe6f9e9651ae8980f9b633b27c660e30518

    SHA256

    1adf1cb0f34e2dc1d06039528d2b3119e8c1b43d07e1efba31df1510348257d2

    SHA512

    e041276eeb93a5aac584a5bfd4d357f4d91270624b79e4f9c7af7595f02db01ab4ce40627e8f1ff2c78d3095658db95d5083e285db923b4c2610f38fa1b20867

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\RYXN1WWD\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Temp\Cab4990.tmp

    Filesize

    61KB

    MD5

    fc4666cbca561e864e7fdf883a9e6661

    SHA1

    2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

    SHA256

    10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

    SHA512

    c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

  • C:\Users\Admin\AppData\Local\Temp\Tar4B9B.tmp

    Filesize

    161KB

    MD5

    be2bec6e8c5653136d3e72fe53c98aa3

    SHA1

    a8182d6db17c14671c3d5766c72e58d87c0810de

    SHA256

    1919aab2a820642490169bdc4e88bd1189e22f83e7498bf8ebdfb62ec7d843fd

    SHA512

    0d1424ccdf0d53faf3f4e13d534e12f22388648aa4c23edbc503801e3c96b7f73c7999b760b5bef4b5e9dd923dffe21a21889b1ce836dd428420bf0f4f5327ff

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\ZSFXU81Q.txt

    Filesize

    603B

    MD5

    18d0be226dcfe06803e984d76f8a0b56

    SHA1

    c2f9ab3b4b8cb05dafd2bf4888b9750bc7812c96

    SHA256

    9604d3e8175839d2fb01b4b43a9264995d96c958469a628c31d3a91140d1425c

    SHA512

    a9459fb3330fb891b8baad5402e56fca8d831896acc842bb48c3e67bc214c6374f5e45036bf86b54e5f4af22bfd5ba94fe3bc6c4f4830143ca42d4fe55bc7d08