Analysis

  • max time kernel
    305s
  • max time network
    309s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    21/09/2022, 22:16

General

  • Target

    63b8479bd76dda6d8319bfe64fc22f157ee81a659452fa027ba18b96322eca90.html

  • Size

    609KB

  • MD5

    86e1e8453d6de39c66bc68d1aeec1243

  • SHA1

    8c96c704c8637633262bb6642ee6a65fe3c66871

  • SHA256

    63b8479bd76dda6d8319bfe64fc22f157ee81a659452fa027ba18b96322eca90

  • SHA512

    d4259583e2d493c635b48359b978d22f7e90477d04f3c00de5c4a4628f27d314228fcebc0e98677ff67bb86bc0c73c59e991b8a5dc61eacd4aa37973264f4306

  • SSDEEP

    3072:0ClpGTetRqXgwRsviV1ytjVswRuzl84NebWCUkPDlJtLn6CVhJc7MwaMyFeqmqDb:0ClpGTCRqXtRgRQcSvLF2RPthZpWMH

Score
6/10

Malware Config

Signatures

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Modifies Internet Explorer settings 1 TTPs 46 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\63b8479bd76dda6d8319bfe64fc22f157ee81a659452fa027ba18b96322eca90.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2684
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2684 CREDAT:82945 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:3772

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\J3XU9UD7.cookie

    Filesize

    615B

    MD5

    a473f241c295433b3df64dee3cf109ee

    SHA1

    c321dc2c92cfbaa5f3e035e5f096d798cad69d40

    SHA256

    444116d6d5c992886a0c37a01763fbcd3a1d9fb374d468985c475fc169acba85

    SHA512

    b4f4449b5758f77e412212fd6d2e08c851aeefbb9a2b6770cca49a1342668424df86b267f5745013a854030769ec3250e884f1e09b9a428a0c96a5e678154b34

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\YAZYVUOF.cookie

    Filesize

    614B

    MD5

    862c79eac98f0b8a3b5c002bbf4188b0

    SHA1

    274579b32b9e7657b35633705fd2d4aa40084026

    SHA256

    87147eeae0a10783d6cda8900c96801e6f4b02e3517e95a11e547a1b8ddc1cce

    SHA512

    2cb0c822f277e317fbed02ad9e8438200d853fe9c0a4a1b61bf77a2ad90a5274ca4be8ce3c090c772877d0c7c36412fc7b327067476f0f3540defda2a9726e57