Analysis

  • max time kernel
    136s
  • max time network
    143s
  • platform
    windows10-1703_x64
  • resource
    win10-20220901-en
  • resource tags

    arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system
  • submitted
    09/09/2022, 10:12

General

  • Target

    view.html

  • Size

    66KB

  • MD5

    93619908d08b88af2ceb14a5a748978b

  • SHA1

    72a0477308ac6a0de94d6a7298c79289a44be267

  • SHA256

    a2a7b21aadfdcc320e4b125df0010c1ba85a10f1deb59a6cec4e49957350598d

  • SHA512

    72dbc977ce17ee5d2762684443e374eeecadb8656c0655f5c1d568b5c74876d6e1abaf52831ae44cddc6d1f27fc75c2b31e51cb161b15f4be7c5d1b38d5cdc30

  • SSDEEP

    768:7/lZmasiuc4MyWUqvqoeFG70B/JsNm0DuGdbsDOfONQ4941lqUM8IUCO7Vsk2tD3:l+MdD7bfrM1GVrZcZHc2+JTi

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 49 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\view.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2416
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2416 CREDAT:82945 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2540

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    7baf07c8aa09d0058194d2e0e1cbed9c

    SHA1

    e3415f3a9e96df79fcf4e15cc4a0a409a41f4504

    SHA256

    6d0542d9d06bc9ad76d2f9e3b5f79cce90fe7459f6df6b00f6407bb76ef3fdd7

    SHA512

    b9daadeb54b77c468ec85540ac8265b54301035bb44e7ccfeba48a3592a05b7c30e51c64f0e6b8bb8a748f450166f2d00df9273b76e5ea21be75fea3903f596f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    404B

    MD5

    807df23c98f211414960f8ed22892340

    SHA1

    3d071bdf604487a46ccbedfa60cae71612bd6bca

    SHA256

    8934577d376833e6104e940d7dbbf04b6a3bb25bcb1187158320dbbb8ccccc40

    SHA512

    d32ba4d1acb4c0c2fe5078422a07a7d89ca405a7324075ea0e64f721227506af3faadf760e363f851f774d72b344fbbe555e35d6f2bf4200ed356d820f879835

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\AG0SAB5E.cookie

    Filesize

    615B

    MD5

    5010c7dececfc981dfe8da0518b91a0a

    SHA1

    b3f54250fa09db96789e1f84d4ef19a57dc2ba6d

    SHA256

    4ea7362082bd34efeb08dc0200aa2da024792394ea7815a49952da75fe4c8fcb

    SHA512

    9eb975f17fe8f737eaca41e6150ca27cf44526885c982b26cb63fea4b46c3944070b9fc0384cbf4a9107de2e947a86d5ebfd8b82b928e05396c190f294e01e92

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\B44MZW79.cookie

    Filesize

    615B

    MD5

    d660e12a518f4edd0af339f606fb3dc4

    SHA1

    568a27d1764cd9d806dc0d0dd41387c545619dec

    SHA256

    4f69a16d9432fdfce4bfd70cb1a4c7dbe8d3671727309b56b603909b72cd5600

    SHA512

    359238f08f590a528eb18ad75e4dd803013b2791457c04faabf5c7ff5c417a398ad39578b76dcd291131353eb5c10328814f191a34d6552ad0d6097c83ae357b