Analysis

  • max time kernel
    369s
  • max time network
    871s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    14-08-2022 17:47

General

  • Target

    sample.html

  • Size

    1KB

  • MD5

    b81150861bf911f947660cf73bce77f6

  • SHA1

    905146c739943ce189795e234f1c6ebcab2f57a9

  • SHA256

    23926e9185d8d43c02807a838ffb373cc1977726094a4e46807c66ada9dd7660

  • SHA512

    594b18ea476c41b4aac1f3a900a45915cd8f5f75c3bcf3f8233b9d56dc5e924903f9915db4138bf10d46eac70b088d138003c8fc85520acc5ea1b27d8d0ee8a0

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 49 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\sample.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1676
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1676 CREDAT:82945 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:3748

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    Filesize

    471B

    MD5

    1404973d38eb7c7ef1b558195003eaa7

    SHA1

    6dda05cdaea6633a74daa9d2a4af458f682e16ef

    SHA256

    68e5eb0edc63f6f77c7b1079f2e5993e422f99a4fbba3101d9bea193642f6a27

    SHA512

    f272d05775f463471bfb635ae17e204913d63388996251be8df59d644217a8c8c23d2e60c264b1b5946656c424a36e78e900f079a42b448a947de5dabdc8b10e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    Filesize

    434B

    MD5

    3115d3dd2fed2d60c027ba73689d3491

    SHA1

    65661b27652de8ec86283a095b49a1b4db9f6dd3

    SHA256

    5d9d7be395f8e89cfd6a42ef4424688ff20be1000b54bd41d2d51757e0d13234

    SHA512

    bd5003487337b2aa43dd41ff05e2e56a4d7add09dec71c32d086b248c9441bf232b7a8f05ec0c0ce290446232a645f641d694aeb251544a31cd55a31380df561

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\3OFHQ4BS.cookie
    Filesize

    609B

    MD5

    f83d95acd53efbfae9e5b18199df6e80

    SHA1

    cce987521e7b88ecca2128361a549aa713e51e6d

    SHA256

    e75a7fcc59edde3ebcd72defddac3dd7393fe783a8a66e4a6bfe536d688b685b

    SHA512

    5ef5dac741a74830a7ea8000274b8b55a641823616896d6b8b68ae7842aff661ffbf6ce3d0d0374dab6cd7f231839c9fb5b2f63c1919c6e7702590bb667f935c

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\UBSK4XIX.cookie
    Filesize

    610B

    MD5

    15d0901460b83d853ceef4c10d52f57c

    SHA1

    00fea7c94aa5bece5120b55628eb1ac44e3f6747

    SHA256

    be820acbbaadd0f2b54a7e23f10aed63ba877358e1b3cd419cdfa69532fc44f3

    SHA512

    cab07c5f8271d2c404cac65d50192cca6581ac2c15f90ac372bc29fec9855d665b3e9bad014e02891e3900db3a693a071128b7f554dc5a40756d026a55f3d1e4