Analysis

  • max time kernel
    91s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/09/2022, 20:20

General

  • Target

    Doc3134234.html

  • Size

    48KB

  • MD5

    953efc10824a21f9fd7178934f65bf44

  • SHA1

    8e92d323b599977c197b115c2c2981222aede77f

  • SHA256

    3e8869930b4e17802595f7f25dcf8fbd386ae72dc66a050ef263bb65db5beec8

  • SHA512

    0a6ba1264a34eda0f455b7ad254ad4417dadaed5d37aa16ee52a363d1caaec58327a9fced70938bb7da5dfaba8b05a92d6f4950b554773f971ba143a93586c32

  • SSDEEP

    384:y9AyoYzgi9KTRUC60DGTQPJYRbpG3VrkMev7IXyFfncLlrMC9AgLwfQ58C9A+:WAq9YTRUC60DGTQPuRgxkMev7FUL9

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 42 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\Doc3134234.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4488
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4488 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:4976

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    520071a63bb5e2038486cd0ce14055b1

    SHA1

    752cfb61bbe3ae1e2c2609c53aeee510661a59ed

    SHA256

    f8a989e9cf1fe0f0000c795537122a3c727e3b570b66582bfb62d9bbae4b20f8

    SHA512

    6f0131c9e0943c6a13d52a7525e1c592c95db868bf2dd21a8a37254150a239748985cc31518d0c4844bebfc5613feee6857b5debfbbbd6ed4539cd5e494ebbb2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\82CB34DD3343FE727DF8890D352E0D8F

    Filesize

    7KB

    MD5

    30232b2aef21004b9c41f678e2e19f48

    SHA1

    020a79b36caa521641f4afb15aea28c2d5d4d574

    SHA256

    d3e6fcf8a9a7b1889d36cb46c20a2eb750fa4b96ab66c1a5496f2a217cad6255

    SHA512

    02481095b4e6ad46d5a124793169639976074c7dd713bd551e30e01f6aa65fe6b552864ca40359b931f089f437f2e2acd1f29c80db9561af49202929732d8fd7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    404B

    MD5

    6dc3e3d51c7197ca0e2f8c56a84bc6b1

    SHA1

    807a912603a80147c12885890cbef2511b5c8969

    SHA256

    28e15ca9dd60739e79a3af1c88401da89c6f4372f1c47c30bbfd3fa48b46222d

    SHA512

    97d3bb8627f047caefde07aa803e4af8e362872e2207ffd46f3f0145d94e8f957d6884dae281078b2b7beea4010c005a6f728239491ca7f1797299d7158fd34f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\82CB34DD3343FE727DF8890D352E0D8F

    Filesize

    226B

    MD5

    26181987e474198b7b686b19ff83a669

    SHA1

    8c6154ca6076ec7c9f54ae93cc6a7bce201df917

    SHA256

    60ec292319b78ee216445938fdfbc640787e31afb828c21dec401dc394c895c2

    SHA512

    f79726fd99a56d1318abb20b6a3cef42a01deb55c632b76596b5605c02ecad0574a1cc902bb1c54aa41a64cd302406b6fcd3eacbf8f2b79f1c3831407e471fe4