Analysis

  • max time kernel
    135s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    24-05-2022 20:17

General

  • Target

    f045592284747c6075e70ba621e0b08dcac3e58f6abadc4b240397a773a78324.html

  • Size

    1KB

  • MD5

    4ff92d57a2e459f68465cabd85f0488c

  • SHA1

    d8de37ba8f835a4ea61dcb1559e3191426ffbfed

  • SHA256

    f045592284747c6075e70ba621e0b08dcac3e58f6abadc4b240397a773a78324

  • SHA512

    77b2f5ec4716eae00039135626aed6b8680a3bb597a53f724a7024595805dc183cd5e6970c91be79c56c40bece80531b3a9d18d33df91f66d92162703feb825f

Score
10/10

Malware Config

Signatures

  • Detected facebook phishing page
  • Modifies Internet Explorer settings 1 TTPs 56 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f045592284747c6075e70ba621e0b08dcac3e58f6abadc4b240397a773a78324.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3424
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3424 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:5008

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    Filesize

    471B

    MD5

    3c94b790a4d3d3813b9804b360811c02

    SHA1

    9b42bca99be723330c45b22abb0698f77ef8077a

    SHA256

    7bc88a561babff736195edc916e12556d4a870e9dc94e649adff7d6859468d93

    SHA512

    594410b019fde2552e456bf87934eab332c73d5a1c73c3fac27886bb2c8f2b2c174acb0fa5f67b40a4b41339cff713b239eab680c6dd7aab00aacaf8e38538b8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    Filesize

    404B

    MD5

    8defd9cd2460a87eef7a88633cef60a3

    SHA1

    b68b89114fc7d8dfdcf87dd26c6bfb0d8c71cbb0

    SHA256

    bc8322f4ab23cde57d1d46c53d5b67417c4db8623b31f1eb85a1c02a5b6066f2

    SHA512

    6559924e51d736c5507e76801c45e754283c167fd1d783a63645c1075a0c21800fee299e9a1611cbf3bef48a5e7c77ae7580b2de2f0182eae59714da8dc1cdbd