Analysis

  • max time kernel
    101s
  • max time network
    136s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    19/04/2023, 05:35

General

  • Target

    email-html-51.html

  • Size

    473B

  • MD5

    4f943456105a59148306b6fca325a646

  • SHA1

    aaf686309cdb8db6f7cc20008b25e5f317e32bb1

  • SHA256

    761b8a00a377ca6708f74777055c873f6b0ea7450ca6f9cda2db79d5d631afb6

  • SHA512

    b88929d3e5ca8e88812c32d861f62620ef447e814279de3adfa9b618ce4e255f505967c1c8680899299cd2b80264f43b39144566212ab642c44f6f74900526a8

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\email-html-51.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1604
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1604 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:584

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    45003348b7b582a99de851478bada6b0

    SHA1

    11cf664d2ce07bdb3a21bc0df7c1b85406a760e4

    SHA256

    90e48835d5e8ae7578e4ab11b2caf48782315408763c19e6754558655314e28d

    SHA512

    4c200ce332f9af0f76ee435e63d573e56bdc6b4c45f7db025f604d254b56699a98bb03a01a9b225e3e888a3213bf8ba1a703d2285dbbc14f53e408856ae774c7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    88466045cf3e8541185a0911ddfa8994

    SHA1

    915250a673f7b534b302547c3c737806089eb707

    SHA256

    3d15524646b7b183f9109523a8bceeb50f5f60bb30af1912d87bbb3dc2450305

    SHA512

    5a5b30c6362ea8b197d4ea007d1a1fdce605b916c4e3df9ba1e920e3883dc1d147f7c1c4539a60ab2dc1e85ae3f57bacbcefe15a6d9d5af2dda4f513b853f998

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c17587e789264396a46521a003736fcd

    SHA1

    3368139cc9beaab9f784437758fa6d1255abf0b2

    SHA256

    ed5ab8d8b892a64d833649a415aa8861b58c49aaaa84d906033dea8612888b96

    SHA512

    dbe11c4bec91fa136b47b78d913d1b433a825044d52256ad0be44eb2235ae36edce3472f7339db050031cc357928168872145c4e2d083d004fbd189109ec7ca9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7cf023aed9d91463e64d1497d18655e2

    SHA1

    86a2c90f7cbf15d03244a6f6b77fd5791243d3f5

    SHA256

    106df4386d6e83c364fd20198114ef9a4ba8c8551c08be31b9e7d74beeb349c4

    SHA512

    ec52fd80fcfee034fda57eca4ff8f80403e8e4e1c78a538f4a8bc2d0f9de1ea70ce4566764190a0fcf0d64864d5b8df015b0ddaa038e6d69a25c002a40273949

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0c62071cc89f66190336c7cf7846a383

    SHA1

    2b74e8d5795b4ec4e35956b9496484af9b1661c6

    SHA256

    f33ba51707393e932a9033f08106d076c875c0a2a93d3c29862be0469b661cc9

    SHA512

    b300267c4ebabaf387d06456b14ce266063eef48bdbc144030e7b57e099ccc2675406fa05ef624736cb1fef4d3af60a72f25ff2cda80aef71b47caaf02d14e39

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bb4bd46b70cf9eef459641b79986745b

    SHA1

    bf197402a5aab96e05899279bfc80b73a126d9df

    SHA256

    d78413f2f00fb2ad84c12a8c8f0ae3528f81da64148fbebc279c70944d9503bf

    SHA512

    4b2051d10c7ed25486cf22e5d0481873bc91e210dde5487bbb338105d37ceb7b7c4795fa482ca952d82f020feaa80c8bdbaf31cefe242c86357587f92b9a3757

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\NZTPJYNO\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Temp\Cab2406.tmp

    Filesize

    61KB

    MD5

    fc4666cbca561e864e7fdf883a9e6661

    SHA1

    2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

    SHA256

    10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

    SHA512

    c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

  • C:\Users\Admin\AppData\Local\Temp\Cab3BA0.tmp

    Filesize

    61KB

    MD5

    e71c8443ae0bc2e282c73faead0a6dd3

    SHA1

    0c110c1b01e68edfacaeae64781a37b1995fa94b

    SHA256

    95b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72

    SHA512

    b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6

  • C:\Users\Admin\AppData\Local\Temp\Tar3AA4.tmp

    Filesize

    161KB

    MD5

    73b4b714b42fc9a6aaefd0ae59adb009

    SHA1

    efdaffd5b0ad21913d22001d91bf6c19ecb4ac41

    SHA256

    c0cf8cc04c34b5b80a2d86ad0eafb2dd71436f070c86b0321fba0201879625fd

    SHA512

    73af3c51b15f89237552b1718bef21fd80788fa416bab2cb2e7fb3a60d56249a716eda0d2dd68ab643752272640e7eaaaf57ce64bcb38373ddc3d035fb8d57cd

  • C:\Users\Admin\AppData\Local\Temp\Tar3C31.tmp

    Filesize

    161KB

    MD5

    be2bec6e8c5653136d3e72fe53c98aa3

    SHA1

    a8182d6db17c14671c3d5766c72e58d87c0810de

    SHA256

    1919aab2a820642490169bdc4e88bd1189e22f83e7498bf8ebdfb62ec7d843fd

    SHA512

    0d1424ccdf0d53faf3f4e13d534e12f22388648aa4c23edbc503801e3c96b7f73c7999b760b5bef4b5e9dd923dffe21a21889b1ce836dd428420bf0f4f5327ff

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\7A3GTURT.txt

    Filesize

    604B

    MD5

    d166b67e67a52d7cd7ecd0d1a1482d46

    SHA1

    09399ab923983d41eefe441225ef768adecb5946

    SHA256

    fc1d53b5eda185f28402c651b1929d7e4d5f4095f286dc754977531b9b5d99a7

    SHA512

    b3d25acb353c2f356ed4dd7d328cd742cb62c5e09e372d654d1a9e4ebca9246fed483b48b64a328aaef7b8d607d601a7eb220bbcb1c0dd7cb333090d1d8c5c5f