Analysis

  • max time kernel
    127s
  • max time network
    165s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    06-05-2023 20:30

General

  • Target

    .html

  • Size

    3KB

  • MD5

    2171357ce512462d7f5323790b2199d7

  • SHA1

    6509bbf762416eb4149ed36516d6c5484ce50c68

  • SHA256

    17a06dcbc95b0843b1791503b33c0774e11481a44043d2215ba055d746539872

  • SHA512

    8b9d4d9cc82371f191061faca3fbc48519b9a85c17fbead948cc38aac278e1c772d0362d620da4336115f814fda6f3c53091fb2afb030e21c7e09d5c492e697a

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1476
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1476 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1528
  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1212 --field-trial-handle=1332,i,1725731530175171631,5783895698415372383,131072 /prefetch:2
    1⤵
      PID:1780
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1464 --field-trial-handle=1332,i,1725731530175171631,5783895698415372383,131072 /prefetch:8
      1⤵
        PID:904
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1628 --field-trial-handle=1332,i,1725731530175171631,5783895698415372383,131072 /prefetch:8
        1⤵
          PID:692
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --mojo-platform-channel-handle=2224 --field-trial-handle=1332,i,1725731530175171631,5783895698415372383,131072 /prefetch:1
          1⤵
            PID:1548
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --mojo-platform-channel-handle=2328 --field-trial-handle=1332,i,1725731530175171631,5783895698415372383,131072 /prefetch:1
            1⤵
              PID:1604
            • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
              "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
              1⤵
                PID:1768
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1524 --field-trial-handle=1332,i,1725731530175171631,5783895698415372383,131072 /prefetch:2
                1⤵
                  PID:2280
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --mojo-platform-channel-handle=3620 --field-trial-handle=1332,i,1725731530175171631,5783895698415372383,131072 /prefetch:1
                  1⤵
                    PID:2352
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3800 --field-trial-handle=1332,i,1725731530175171631,5783895698415372383,131072 /prefetch:8
                    1⤵
                      PID:2420
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3908 --field-trial-handle=1332,i,1725731530175171631,5783895698415372383,131072 /prefetch:8
                      1⤵
                        PID:2428
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1768 --field-trial-handle=1332,i,1725731530175171631,5783895698415372383,131072 /prefetch:8
                        1⤵
                          PID:2784

                        Network

                        MITRE ATT&CK Enterprise v6

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                          Filesize

                          344B

                          MD5

                          39a15e48b9e560ba380bfe84d162e25f

                          SHA1

                          adfe063acbdf463230d8d210e1ed7aeba7561c3b

                          SHA256

                          a23bfa5e4036d854a6f045f5382f9bc16fb27644e48e6dd03143390a7eded46b

                          SHA512

                          4e320fb7088e44d748dfdbd459b0d4711aa41fa780629cde09b763ebb184c53344ac8abe505fe0eb573494fbfe00340346ee37e37109b57bac0f14a63eef838c

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                          Filesize

                          344B

                          MD5

                          99a5f108c354c61aef8c1d9518fb9077

                          SHA1

                          497a02ca485f7b8f8af68001a7de82f31801cc82

                          SHA256

                          cd3d1c81e0980cf5b307804199e23e4927113b3508e6995c24fd1405c0440eb9

                          SHA512

                          40b59f76389e548a64477d45866dda6eae93ab78ba58c18157c067f492bd34f7763f11443b3730f909af2ab26f686481d66a446f6010b5b475dba38d28d30848

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                          Filesize

                          344B

                          MD5

                          bb098dccf2db3a46904993a68b8e7a25

                          SHA1

                          35f5d91d09c345bb24fb4d4111bf2f4e345d35a9

                          SHA256

                          d5850afb8d6f75a0fb49fe7bac5900ea50bf3999434f277fbc75529ef86906cf

                          SHA512

                          145eddcebe20383f782c68128be48a19c1444f0622ec174df39265839461685b7403fca1f08b145726be0bc532ad559fbdb9f2565cd539c487cd51980a84c290

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                          Filesize

                          344B

                          MD5

                          ea3bb105b813fea9a181e732a3bcd36f

                          SHA1

                          4ef8a67bb8e1bebb6ce4773e3a6ca1ec8dd70afa

                          SHA256

                          a5975c20d09ffe3adcd75c1bb797747f1cd1dade0447b2db02b6fdfec12b18c1

                          SHA512

                          96583b49e5757f942677e6f693db75fdffda8fa15a6add816b68920b5ef664d3d577dafc5d81d74d9c860a9c11856f61eefa447b8dcc3a8a5775cba7a625c692

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                          Filesize

                          344B

                          MD5

                          e607e53550743b4ea20f999ad37c2aac

                          SHA1

                          ea06b778c105c00627aae93449003b01f83780f3

                          SHA256

                          c1731644b38799faaa7ee3ab1143af130eee96655ef2629cfb49f6bbd28cf088

                          SHA512

                          c1a848f59a62085bbdbe93028fa2b07c0f7a7dbcc1f201abc44b26d0b83decdd5bdabfcb97577436550fb4bb13008b9a183cfd7d15eba782ac98bf3d5a89deff

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                          Filesize

                          344B

                          MD5

                          d650cc8757c8ee9166587be441709018

                          SHA1

                          1c2b114ca90a98e2d05a382c48bdc672beb4e69b

                          SHA256

                          ccfa2a20bd882c07374f825719273002e4f344e51140ebff49b5c20ddaeae9a8

                          SHA512

                          35e9441ce0ce7a5286aa61f5e8228880786173725a12a90c5c5ad82bbe6e05456e7e55755aac0db19aee7d013ad0c606e582e29174dc5d69dc8d1c47a1e916a7

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                          Filesize

                          344B

                          MD5

                          8d19f161d4b2fec37e815025e4cec270

                          SHA1

                          aa732a1aa66a9ba1fcaab708196fefc2d9ac130d

                          SHA256

                          4c89c6c4a0b22aa1fdf95268d50038aa4db310de5a63d296701fa450bd87d056

                          SHA512

                          1737c5174539762748e2e98e31059ed993ea741e4df025b0d9dde0c36a754f4f414f53f3c0ea80613f3a40b9d5c60b42792934e371083c9126bb3a50abfa433e

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                          Filesize

                          344B

                          MD5

                          4df4d0d8b438b01debd3e9320cefd550

                          SHA1

                          7daf1801a7f0f13be99eb5ef7a7a3ce6cb9082b2

                          SHA256

                          67b6d67c67a181dd546881f9bed33a83f8d5eb8ad2693797c4139244a0e794a1

                          SHA512

                          0e187db3aa85eb53813593969e8118b02d19a805e7f9e5c0c10744b534c94e145e5a5d8563d6a5022d8f518e16e158cab90a39ea0febda08f4fdba29c25587f1

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                          Filesize

                          344B

                          MD5

                          b9d1614a51cfda3846e4e5e5408b381a

                          SHA1

                          02e787630a112465ab25247786654116a81ec9d8

                          SHA256

                          ba7394168169943564bb6685b6c5c7d2e3636dbaea960a8f554b8d7583264af7

                          SHA512

                          79f10c78960e5d4dfbb3623a739317a2e0d9632af640c34b6e1af087ab19acedd70b48023430c03e9b6426fddeb6080bec761761289c7cab5e52906ff8eab59a

                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\QCNSQOTT\suggestions[1].en-US

                          Filesize

                          17KB

                          MD5

                          5a34cb996293fde2cb7a4ac89587393a

                          SHA1

                          3c96c993500690d1a77873cd62bc639b3a10653f

                          SHA256

                          c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

                          SHA512

                          e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

                        • C:\Users\Admin\AppData\Local\Temp\Cab97FD.tmp

                          Filesize

                          61KB

                          MD5

                          fc4666cbca561e864e7fdf883a9e6661

                          SHA1

                          2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

                          SHA256

                          10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

                          SHA512

                          c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

                        • C:\Users\Admin\AppData\Local\Temp\Cab991A.tmp

                          Filesize

                          62KB

                          MD5

                          3ac860860707baaf32469fa7cc7c0192

                          SHA1

                          c33c2acdaba0e6fa41fd2f00f186804722477639

                          SHA256

                          d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

                          SHA512

                          d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

                        • C:\Users\Admin\AppData\Local\Temp\Tar99BB.tmp

                          Filesize

                          164KB

                          MD5

                          4ff65ad929cd9a367680e0e5b1c08166

                          SHA1

                          c0af0d4396bd1f15c45f39d3b849ba444233b3a2

                          SHA256

                          c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

                          SHA512

                          f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

                        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\Z7RK6P81.txt

                          Filesize

                          608B

                          MD5

                          65c56beb04648a653c1bf4955e8d554b

                          SHA1

                          cefad79a9bc9c92ed1e3efba8538e1bc62eacf2c

                          SHA256

                          4c80e93941b18c3869316ba2b56c6f20aaf838c9c5da26ad4c890cba7228b2b1

                          SHA512

                          0c3e03efb5c29b8cc4a4e1fe5f30fa35eeaa76b496b5eef08d06ec6f20d1e9dddd6b84cbc1ee4a33ebdee93a552239a3796c45e2314f48e59c5b6ebbde2218f2