Analysis

  • max time kernel
    136s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-09-2022 04:29

General

  • Target

    ed2k.html

  • Size

    5KB

  • MD5

    47191e2d4ac71305c29b07a5305f5495

  • SHA1

    b01f3fd634f54f9b73e2959f83cab79f5ecd1a9f

  • SHA256

    ff9fff6607207433fc9a4109c25b37ab510180fabc1927e8e77219ee3529eebd

  • SHA512

    96d8c7d59d953b2aca52eca9082e50e2cbdae810362abe016ca6a1fd597ae0cf73fd0b0816e5055434e73ef401f75650a132e30b9d9a99112271655844fb51c0

  • SSDEEP

    96:HIbUQoZEix0nW+lijlpTWn8vjvAqg/u4UTWYVgI3kwTkdNG7u0WKP6P9JN7GHuva:HIHQ9x0F6pTWncAq/WYVLQmJ36cuvX07

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ed2k.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2868
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2868 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:4908

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    1520b1f0e8660cc8553264ce46871efd

    SHA1

    70c43f2c0b7599f782461590f8e1650a2df5dbfe

    SHA256

    8bb8dd5446da57093db31c10b4093a2378a9324f137d3eaa21ab0027e191c09e

    SHA512

    6ad8d5f620738988286981654070c9a4e2542f629f4e5245381143a2a88c98922145759ff8d90546e1a617639a7dd335ddca4aba5435fb216c01c705bc4f0be0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    404B

    MD5

    1aba87d1cb525dda3cb4718234194d41

    SHA1

    292b96523efb5bd7e3428291b9847a9a7de24d46

    SHA256

    2536545f7711e8704a2be0055b1908afea362ac5ef5d690abf010e2adf857822

    SHA512

    c98b6b1838ac7779b4dcf8debff78c995cd901e16b1d6f8dcc0693811938510f495ab99e8c2117375e75760234c524afbf68701c5ad7453b2898a413656bd820