Analysis

  • max time kernel
    91s
  • max time network
    144s
  • platform
    windows10-1703_x64
  • resource
    win10-20220901-en
  • resource tags

    arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system
  • submitted
    08-09-2022 19:43

General

  • Target

    uc.html

  • Size

    1KB

  • MD5

    6650365e750c2c061e79c81a99b8262e

  • SHA1

    6ed7cb14a6563618b1fd14c56e4a7beb816df2eb

  • SHA256

    8872a2437d624b4877cdbeb08625b1da3fd844649a1bf455c00516c88e887f14

  • SHA512

    18b6bcc33dc45dfb0b1c336fa191fa10502ff5732376194fb8582f5a7598bfe91730fdb96831467bbdc7632e6cb3e216d7d00d8ca26a5c481374bc372db6f29a

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 49 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\uc.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2860
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2860 CREDAT:82945 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:4856

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    c8a2d143b6aea04cb5e328c8bd46956c

    SHA1

    8cac006cdc9d239da7d894e4fd5f30f4af3f9c06

    SHA256

    d30217f12a5046445df75b40c50cf9946c639edc09947351b76d30db6df84830

    SHA512

    2976258b4273cd9b7347cd8f927dc3046f8b26135c02f69d530b170947bd6dd72ddc59a20e3c9b69dea81c0edcd18bc3e0893020e1fd99d3b9150ff5345d6862

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    404B

    MD5

    4de4a1580cf7692a308ee733cb62d9cc

    SHA1

    0c3b998806f509e1c1e31030562e7ebd7bdb409b

    SHA256

    9750b63177ed5da491658f5c6041f3be1e7f358467c3a6cd4e67b5b4d76c8e3e

    SHA512

    e58932fa99f9f6a44a5c0a8f769adfb05e9c72d70faba8de1e60ca23d1059599ed5c0b6215d4a79111014ab5defc74ad0502ef874b541850eb302422cffdca9c

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\J2XZL6KM.cookie

    Filesize

    607B

    MD5

    6753f70419c7d7f91a8073f639ea290d

    SHA1

    aaee2e7ee6ff343d29a3ec436b38af7db314ac32

    SHA256

    f18f0bc5cb1b0d3c6a1b88db78bcd662d412f541ca3c1f8bd90ec453d51d9a79

    SHA512

    cfcb4c66a2dbb9f79b9abbfbdb012dfbb1ebecfc526af47c5ff3bba260ded5c86b53cc480d3bcb1fe84dfc8416f6275848ae449e989b370de832be1b51055e48

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\LD5L5LJL.cookie

    Filesize

    609B

    MD5

    5e7ceb04193eb598d042d0543bdcb4f6

    SHA1

    1a09bac020bf31a293cc2c846381c97e9904fb8f

    SHA256

    31715571a9f1c34219fa8c6c84125380d7987d14e6d8c050d9b4091da3187814

    SHA512

    5825cb3e8b0fdf805929cc229f82c2a041a0283d271fab353632faf7af8634b2d938ed38bb6c4f0b6d7724af22629f082ce764b12bf507c14322f6943d1340a5