Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220721-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-07-2022 10:43

General

  • Target

    file.html

  • Size

    305KB

  • MD5

    d89d3c3cea154915a742bf8b52abe43d

  • SHA1

    acb97f43a1e6e8602e8d12418e5b5b71a2a1b083

  • SHA256

    78bcdef2a920a1927fee569803826bae3425e507d354eac71136b2a103abdb24

  • SHA512

    344cce22843772d22e37d543d698498e335048e3fe9f07bcf380b99f26f53847ab25c185f3ec4ed2319d738c9dfe3b71ce4f70f93d971dc4f13ceafbe1f260bf

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 46 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\file.html
    1⤵
    • Modifies Internet Explorer Phishing Filter
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2256
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2256 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:4076
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:1704

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Modify Registry

    2
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\82CB34DD3343FE727DF8890D352E0D8F
      Filesize

      7KB

      MD5

      6d339a3220150e29ed72f0571a55386f

      SHA1

      bf30946cc25eeef3ad6de44827eacf443104cab7

      SHA256

      7f827a9894162af9187f32ffcbdf4c7accb769427523b056909b3a9c2e483933

      SHA512

      aef317187d300d8842826964ef893441870d20d6726004c235eed3c5f1fa0bbe5b8738e461a263459924216f6af31c46cca87d7adaff4feaae95a6dcea5c5c79

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\82CB34DD3343FE727DF8890D352E0D8F
      Filesize

      224B

      MD5

      4e12f8ffbdbebb7d558b9b5119d4d270

      SHA1

      c24a6945f4921bfedc7c76a38c5c78adfe4e7535

      SHA256

      5afabfd221b5926a6f42b1012f1f886fc0f714c7c1bd6ab9a79a98fcd83c5d3e

      SHA512

      dd65c3eebbebb2256793b41adaef596e9df98651a47ea1201b26e252f2774204015465d85f3c51e3c0a8ee2a17d82b9fabc4c302284859249eaa922a5584c72f

    • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\VersionManager\versionlist.xml
      Filesize

      15KB

      MD5

      1a545d0052b581fbb2ab4c52133846bc

      SHA1

      62f3266a9b9925cd6d98658b92adec673cbe3dd3

      SHA256

      557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1

      SHA512

      bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d

    • C:\Users\Admin\Downloads\Video_29072022_1080p.zip.jisuods.partial
      Filesize

      5.7MB

      MD5

      ff54ada00f58826b6dd17f776183f0c0

      SHA1

      5e837885cef4c3b18a572280074ee3aa740eb3e4

      SHA256

      695df1930505266fadb521116c40a7eb8c68ebce08d5b67501e262552b834e65

      SHA512

      9adff3db29e07caf14f10ac2ec504f33f7d688b16a9647d99c1e144eb4e47513ba69872a11425f60fe5637daa99ff660242cbfa5ecdc3dd31671888d18cc0df2