Analysis

  • max time kernel
    153s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/09/2022, 10:52

General

  • Target

    04d11861f08b9bc14d7b702211662d47b6ea9d6d0185d4eac5883d133f866a8b.html

  • Size

    31KB

  • MD5

    459cf9880297070bc7e9b0a3b32b7fe6

  • SHA1

    4518f8ae76ce2365713db171a202eb9cc414c7f3

  • SHA256

    04d11861f08b9bc14d7b702211662d47b6ea9d6d0185d4eac5883d133f866a8b

  • SHA512

    51abab1d78119201622a3fa6ead1c69247524ff2dbea939f4e7a148d4d3c76ce133a880d00a91bf849f2aeccf017680eb3097a01b50718165b46c13d42d8b8de

  • SSDEEP

    768:Fywqqy+uzxjFpDAp99ZSF0zH9HhfKD66Y:Qwly+uzxjF529nfTt

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 54 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\04d11861f08b9bc14d7b702211662d47b6ea9d6d0185d4eac5883d133f866a8b.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3028
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3028 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:4048

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

          Filesize

          471B

          MD5

          520071a63bb5e2038486cd0ce14055b1

          SHA1

          752cfb61bbe3ae1e2c2609c53aeee510661a59ed

          SHA256

          f8a989e9cf1fe0f0000c795537122a3c727e3b570b66582bfb62d9bbae4b20f8

          SHA512

          6f0131c9e0943c6a13d52a7525e1c592c95db868bf2dd21a8a37254150a239748985cc31518d0c4844bebfc5613feee6857b5debfbbbd6ed4539cd5e494ebbb2

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

          Filesize

          404B

          MD5

          6730fe6fe18be00236584086521567f5

          SHA1

          a7dcd86460375a9234025c3b61c4591edd2c7a13

          SHA256

          f541cd903da94de73adac5545c8a5234784b1aab5912001a79d523ca7ced8702

          SHA512

          fb3e19428f535151b16bece6cb432bb6566be5d78d42d34cd67b4dd9cbe63f33e256fb29f0bdedf184dd7bd901629ac0925c56affb28fb81e942e110edb25d15