Analysis

  • max time kernel
    144s
  • max time network
    182s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-09-2022 11:05

General

  • Target

    2d3f5ab329f43df041a7aaac7b9e3668ccb3248c90e9fdd3390c84508f62fbfc.html

  • Size

    95KB

  • MD5

    a21f7265077463010c0cbc9280849d7e

  • SHA1

    8d5b86277586058f5c9a1663a5c09572a92ad180

  • SHA256

    2d3f5ab329f43df041a7aaac7b9e3668ccb3248c90e9fdd3390c84508f62fbfc

  • SHA512

    d33065d8e058a5b325c9a8b61d46a48b7b54d7e886ba700661852e2a483d8ca6c611f484602a2c83fa6eb3e61497e8b731cf8e934d0d2a79e80709be511e9fb2

  • SSDEEP

    768:sLnLRoMBr/tcl0nnd/O8qTiH1enGDXOsYkQ8vOOCgCTuQwlsuacN2qtqQY7uuNkb:M9Bi0ndm89YbRqSua6qT7IUH57U

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2d3f5ab329f43df041a7aaac7b9e3668ccb3248c90e9fdd3390c84508f62fbfc.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1052
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1052 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:3788

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    520071a63bb5e2038486cd0ce14055b1

    SHA1

    752cfb61bbe3ae1e2c2609c53aeee510661a59ed

    SHA256

    f8a989e9cf1fe0f0000c795537122a3c727e3b570b66582bfb62d9bbae4b20f8

    SHA512

    6f0131c9e0943c6a13d52a7525e1c592c95db868bf2dd21a8a37254150a239748985cc31518d0c4844bebfc5613feee6857b5debfbbbd6ed4539cd5e494ebbb2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    404B

    MD5

    cca893a67b8fab69cf6f21b9f6ce6324

    SHA1

    916601d2f9e2bdac5a886c508a488587b54f9561

    SHA256

    c5cda36a8dd02e2f262bd2f1b307694e034a5d36e1b499a3e7c5502f7bbf27bf

    SHA512

    1f53007cbd9ac524c7a969b2c91ab63676b0bb79fdec7c3431b554689044e9481ae8b14304b33b826d720164ae4dd3d12d5fa482613daff6ec018be69aae5ef3