Analysis

  • max time kernel
    101s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/09/2022, 12:13

General

  • Target

    906db0b225fa13a33bb02d030b1fc513bae22870815e0ad87ea459233f7900e6.html

  • Size

    15KB

  • MD5

    d60375b22c61c4372f63638caeeb6564

  • SHA1

    8ac8f9bb1d7ff15966b8caa818d6cc1497d26f8e

  • SHA256

    906db0b225fa13a33bb02d030b1fc513bae22870815e0ad87ea459233f7900e6

  • SHA512

    cefd51e0598316bc162e6d25d32b17d76dff397f6c1d470df811c0874fe2e5348b01ac544e4d8710cb0fc398dad5838da66f0717c018f0296858868b9cea0add

  • SSDEEP

    192:tPU0IPU0y9/gMFh5R+ilukpfxkTG3A3EZ3/c3AtxqFS8zbks03/3HB3DKkqa3GEq:tPIPy9/DFh5R+i9kT8klEEfr34FuH

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 44 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\906db0b225fa13a33bb02d030b1fc513bae22870815e0ad87ea459233f7900e6.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4800
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4800 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:4196

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    520071a63bb5e2038486cd0ce14055b1

    SHA1

    752cfb61bbe3ae1e2c2609c53aeee510661a59ed

    SHA256

    f8a989e9cf1fe0f0000c795537122a3c727e3b570b66582bfb62d9bbae4b20f8

    SHA512

    6f0131c9e0943c6a13d52a7525e1c592c95db868bf2dd21a8a37254150a239748985cc31518d0c4844bebfc5613feee6857b5debfbbbd6ed4539cd5e494ebbb2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    404B

    MD5

    85cb05764e8a0f2ad6ca7204c7ec1f6d

    SHA1

    fa7eddd3d602ea8b629645d9d89b37ff5a0c0e9c

    SHA256

    ca8321b7a6f4bbe0a1c73e6ecd6712eeee4e90ace70f47b6a99739ad6500a11b

    SHA512

    4031f7be4cffa33563e1f291df7f78a1d659476c8c6b38b45a1152c4751905bf07d97bc5e38bae21ce3efe292f759ea910cc9ae1a470078571f3136e07576dfb