Analysis

  • max time kernel
    153s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    23-05-2022 21:06

General

  • Target

    Contact-Customer_Care_1973-Helpline/ENJdfdfdDEfMnifd00iE888Error8/index.html

  • Size

    40KB

  • MD5

    5c6b0147dfff4bf2a52fb6a221396452

  • SHA1

    9bef33d6f6b291b29452dfddc8296d205ace2b7d

  • SHA256

    9a8f57e19a0f8809dde17ef711bffead3e2f2d1712fa11b5810fec6bc05a96a6

  • SHA512

    2d8f84b50ee7dbac1e1e26dfcf030b38d7df1717608464959fb0fac196c7c04763ad9fa5b00d89bcd55025632d2c8ee820cec4ee7d80c21bf651084b3a8ec403

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\Contact-Customer_Care_1973-Helpline\ENJdfdfdDEfMnifd00iE888Error8\index.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4888
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4888 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:3176
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x4f8 0x33c
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1760

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    250ae6beaa18d24f978ab61ff194f33f

    SHA1

    18d3eec1d9dcb5fe0d4fb4244cbabe8078959d9a

    SHA256

    8e8a63116aca846f76b38433c211a33c55c0d14d21d22e83503a18a826527bc7

    SHA512

    b4135b9f09c039fdfe0d053642fe24c2f70050cf17369fe6e80b969de629b0cc6c7734b4f1590eeafa4f8559ee0e7506bc36055bd37b6cfbf376d4e4dd2e1d12

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\82CB34DD3343FE727DF8890D352E0D8F

    Filesize

    7KB

    MD5

    5c1113b7526a7723b64400d44129fa78

    SHA1

    af1b7813ad3e00d4699e5514a77984d5b423b757

    SHA256

    9ecc27c740862ab2712da2c4ff31592e2c0a8643576e64551ee344a73fbe2494

    SHA512

    4b47b9886884bc1eb0651c53eb1805922b2889d42076665bbd9f4b818d54c1bc86956e79cdc254c847b83640373b22a77f9bed9987fbd58c9104bca807a2d2d7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    434B

    MD5

    b463d347dae8625d73a7a1fa98223e71

    SHA1

    95dcd659a68cd91b0d3733fd7c11f7fa80ccd7a6

    SHA256

    9353315324ee201e61077a519123103ff5b27fb5edb23d01d7eececf313e411e

    SHA512

    55d0b31a7f5c3d6931dc702ffff9bc0c803b5310ff6b1eafd9f85e73a17bb961099713d4c7c888ea07074d0fafc6bb6b6fb17d572d1801c2cd111478fb443611

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\82CB34DD3343FE727DF8890D352E0D8F

    Filesize

    226B

    MD5

    95430bc68ddfb1d11470081040b4da5f

    SHA1

    3781be1b5006d3f6d9507b5660e1d6daa79bfb11

    SHA256

    88bee4287186c896dba678b0f132f5791ce7c22a2571de1b60b5af016e868c14

    SHA512

    ced8da9320c2e4d80b308c559b924e17d97ab2a9f09936250feeedd7fe3b3f42893f02f8f0b32df9d932522d8f2be65b1052f0449d820c865856b3a3f1abb1ea