Analysis

  • max time kernel
    134s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/09/2022, 13:11

General

  • Target

    1ec2c25e8f79457a50333288457e9e2c0fa1a0f2d9afac6ab6a3185dc13ec2fb.html

  • Size

    12KB

  • MD5

    c5f8f30b639d63f6dcbddf38c488b611

  • SHA1

    b6d4c05667ef07ff7e2f6586fea46633ab4f87fb

  • SHA256

    1ec2c25e8f79457a50333288457e9e2c0fa1a0f2d9afac6ab6a3185dc13ec2fb

  • SHA512

    f345e89071e2ca9eccb44dde3337c26a23e43544bdde656241cf5e6ca858830d9b9f517cff6153fa6f77b2d5fecdfbd238eaec798c2cfe1d4ff9b28f472d3ef3

  • SSDEEP

    192:mgguXiniejvon2yLwyM/SV9Y3FExGP93qcsY/H0p5bFe7r6UBwvvteVqVFG8LUFo:HuZEz2/SV9Y3RP9Zee7NqvteVOP

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1ec2c25e8f79457a50333288457e9e2c0fa1a0f2d9afac6ab6a3185dc13ec2fb.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:504
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:504 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2784

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

          Filesize

          471B

          MD5

          520071a63bb5e2038486cd0ce14055b1

          SHA1

          752cfb61bbe3ae1e2c2609c53aeee510661a59ed

          SHA256

          f8a989e9cf1fe0f0000c795537122a3c727e3b570b66582bfb62d9bbae4b20f8

          SHA512

          6f0131c9e0943c6a13d52a7525e1c592c95db868bf2dd21a8a37254150a239748985cc31518d0c4844bebfc5613feee6857b5debfbbbd6ed4539cd5e494ebbb2

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

          Filesize

          404B

          MD5

          d6b206af92085a262eecc3913dc67e89

          SHA1

          d1cc10244ab88847e9e1fdea9ec241e81e83ca3b

          SHA256

          4a57d259d5b5677aff1b43147286b36050bd74b40de265dc4fe09997b81c83ae

          SHA512

          33e03975f7814ed56d3212e6935cd713f0136e9865a6aeda51b11b010746112bde31a1ee35072b61439585cbe2dcfc2b4fffb0acd9e80e2cce97f2762ab89f17