Resubmissions

21/09/2022, 09:04

220921-k12gkabebr 1

21/09/2022, 09:03

220921-kz8jgsfhe8 1

Analysis

  • max time kernel
    150s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/09/2022, 09:04

General

  • Target

    0PSv-K6S.html

  • Size

    821B

  • MD5

    994262b501985e88257b9a1b0a422c14

  • SHA1

    5c5c67d529c0365ebe2790145fb284e80acdcad1

  • SHA256

    b805707ca31ad1fdf86038931ab8aa8b2ef7665661a2eabc7f2b2441e1d17357

  • SHA512

    3329e6f1deac06bb505ec19351395ec70074c82b243cd0b77d474fcf6dd1ae13237a3fd034f45d317451872c3937a3ae4d1b1c47ba0537d192c3d80505fed637

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 40 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0PSv-K6S.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4892
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4892 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:2284

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    50ccb6305f667bc427d115125f962cac

    SHA1

    b0d82ebe2f5cf5b520ba7edcf7b2734cf4f2d200

    SHA256

    fd9644d82e1e00505eb4e716136b42befb20145a05057f0cb052d1793a853a58

    SHA512

    9687b5fefe3505705846b3dfa22cbcbcf7c04fdfc1f386998f1a0c8e275ad67faa9976ed51638cfe0d219422fd93dc8ee037653b96bf1956b298b31eb35b507c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    404B

    MD5

    dc221b26319ab789a002ad6a9c76b5a8

    SHA1

    cd5d51eac74b001237dd752fe4ee120ae5dc7b7c

    SHA256

    88fe086db8c094641526257be0aaadae44cb23360500d5c458ae5e9e609c7999

    SHA512

    a35a1b393c348351bb6408c196e728eebb318e1eb871c728465360d540ea4193015c65cf891211f360d413a6fec520d9e6252f4defbc28bbf38f3506b8ff63c5