Analysis

  • max time kernel
    124s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/09/2022, 12:59

General

  • Target

    ☎️ message 6465588.htm

  • Size

    14KB

  • MD5

    a1811fa41fb7288f3447d6a33347c7b3

  • SHA1

    d2cbf57b3f3c10a899ff2ba4ebb5a8e506678362

  • SHA256

    24ac40ca785c6aa0c0054037baea570a48a3b0ae2844eea38b9ca5ac8093a942

  • SHA512

    e72b5f1f53ec0ebd1ebe714d52f26e06e91d910da03ffdcefbac136be34ed3a70871c833ada4f154d297415de54bbf281aa05c001eba124c064923a404d661a9

  • SSDEEP

    384:GbAXgahOZrLb3mjmRZxIIU9xeoa/Pb6tlfL5wah0MyZ0mo+JgWwaThTZbKob0:GbigaUZrLb2jmRZxIICxeoa/Pb6tlfLP

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" "C:\Users\Admin\AppData\Local\Temp\☎️ message 6465588.htm"
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1944
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1944 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:4936

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

          Filesize

          471B

          MD5

          64516f819c8da76f402e4b40799ddadf

          SHA1

          d8582566e6b62bf032adac5699c1649e3a009f94

          SHA256

          471042636f1151ffc6880459c33a579f669808e93f2043a073d1c8af241e28d4

          SHA512

          431396796a20d97b545e4cf07646b8ce5c9e47c198bd9f24b9d1546064b7acd60f3828eab3c52ff43db3d5b4814466176421d42d183795b0e04d6d10bdd07c97

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

          Filesize

          404B

          MD5

          bc3cbe52cbfef054dfc458a869ae08a6

          SHA1

          dc80c432050d2a338c8b9ffb128bfed8599b583b

          SHA256

          0f34b94318bd54bff02cf482a206532f3d9deb38749e71b82eb3a768c28f6c02

          SHA512

          b4ef5a4a58c6c1baf21a37557f082cafd376c159c0d5ff8f29e1a1154d96368ff106443fa40ce7a2bb5db288a0052d7a9807a110a60bfc21ab8c9bb75189b8f7