Analysis

  • max time kernel
    132s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    20-05-2022 06:18

General

  • Target

    1d80b05ba8178c677ea2fca87d59432972635ec2b4e5bfbc9e90fdda5e1f5f92.html

  • Size

    51KB

  • MD5

    a0cf63330c1af7751c5db555ca1c3482

  • SHA1

    fd528edbb4248e7ce4d46f709435d80dfb87981f

  • SHA256

    1d80b05ba8178c677ea2fca87d59432972635ec2b4e5bfbc9e90fdda5e1f5f92

  • SHA512

    1f15ee0ad942a7e7e1bfc95875840e6682fe97ab8e4d7bc2257493f951e73745b1c25925e2e0b9339e7f26b607003e6fb5e9384768949251d4b2943b74b12652

Score
10/10

Malware Config

Signatures

  • Detected facebook phishing page
  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1d80b05ba8178c677ea2fca87d59432972635ec2b4e5bfbc9e90fdda5e1f5f92.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4760
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4760 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:4412

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    Filesize

    471B

    MD5

    003a496cfd41526dddbe8b00273a047f

    SHA1

    f59d563a2a66fe14a3f7787a00e96359aedb5ab8

    SHA256

    c7a19cd00fd53275f30a71c8f5d87161e5caff68207f4069079ea1448a9ebf41

    SHA512

    e4601d093066d6b28e0d99057218f7fb2501fcf24d59b46e0b7babcd24408f4cf0739873b5e74580d6b7a49df6af5ddcc241875ab4633a872a2262b7e7e0b191

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    Filesize

    434B

    MD5

    5ff655465af96e63bda8fc22542bb59e

    SHA1

    faf94db7d58891cf2b99ea4cc854090b00b1fec2

    SHA256

    e3f1657f152769798a57b2a8a02fe92545bfe3e0da0aa45640b581f9df4b04f3

    SHA512

    fa0064e33740b37468b950d8ebb2f325bb76e59a304e38e43e63c297bba5896701355797dbb9422afffd92bf65b973c3e69685e6280c68efdf5f7988279a6462