Resubmissions

16-09-2022 16:18

220916-trxxfsbhfn 10

15-09-2022 14:37

220915-rzkkzsdda7 10

15-09-2022 12:25

220915-plm3vadae2 7

Analysis

  • max time kernel
    73s
  • max time network
    194s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-09-2022 12:25

General

  • Target

    Claim_Letter#630026(13Sep2022).html

  • Size

    531KB

  • MD5

    457691291b130861f9a0bd3713cebbd2

  • SHA1

    e953e92ffdcc6c2a0690cac3609efbd45e36ef3c

  • SHA256

    cb6389c030782452ce9db7d4cbb665de06d969ea03aa0fdd235a018d99398d04

  • SHA512

    bd8178ba129530de28491bb86b730233b61dffff830d341b83264905af5eb61057c47e94540f403bde002f3ed30ec33cb1c5b11a5e2a4cdbd562dcc8eb04b71a

  • SSDEEP

    6144:bmG04xlIE4w2SJrjY82oULCyIK5Uj+N2iZ+crS12IDkw1gof4lSBusVe5Mk/D0cH:zUUxi0ZAggof4sQr0cLGu

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\Claim_Letter#630026(13Sep2022).html
    1⤵
    • Modifies Internet Explorer Phishing Filter
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4636
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4636 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1932

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    64516f819c8da76f402e4b40799ddadf

    SHA1

    d8582566e6b62bf032adac5699c1649e3a009f94

    SHA256

    471042636f1151ffc6880459c33a579f669808e93f2043a073d1c8af241e28d4

    SHA512

    431396796a20d97b545e4cf07646b8ce5c9e47c198bd9f24b9d1546064b7acd60f3828eab3c52ff43db3d5b4814466176421d42d183795b0e04d6d10bdd07c97

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    404B

    MD5

    0f0636d637191f523656d062d330cfde

    SHA1

    f71cca448a8149445a93e428e78c8f8befde9d4c

    SHA256

    49e0e3603c18e061aeabf3d11b36d22ffd8bc5d7acd42dbebde8e6bfd304167e

    SHA512

    e08e2d18bd5d861d0b59e2b949018aab0e2e5be8b39cac26c4d799a92bddbc9cd295e4a0d729a99130ae03a20b23f3380f19363d1e6d403e0c445a2038ada12e