Analysis

  • max time kernel
    144s
  • max time network
    224s
  • platform
    windows10-1703_x64
  • resource
    win10-20220901-en
  • resource tags

    arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system
  • submitted
    22/09/2022, 10:15

General

  • Target

    4dcde2d431c0da3c4a28777f5540bb0af8a5454da3cd1914e7fef14305042faa.html

  • Size

    612KB

  • MD5

    0f580099a8606ec2a8e66db9a08b0662

  • SHA1

    8a23e9c40bec6909c78fcbc9010d94ea0bf4085c

  • SHA256

    4dcde2d431c0da3c4a28777f5540bb0af8a5454da3cd1914e7fef14305042faa

  • SHA512

    70b0c78befd8343c17fb0d90e88f29550262d8b0ce3ca162fc1d3e307644dbbc5f152a4e1072ebf37034c72a37f2f853f1738ea1db55d30947bcbc78c9118cd3

  • SSDEEP

    3072:KClpGTetRqXxwRq5iV1yt9VVJwRuYNN0CbWCUkPDlJtLn6CVhJc7MwaMyFeqmqD9:KClpGTCRqXCRXR1ZSvLF2RPthZTyM/

Score
6/10

Malware Config

Signatures

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Modifies Internet Explorer settings 1 TTPs 49 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4dcde2d431c0da3c4a28777f5540bb0af8a5454da3cd1914e7fef14305042faa.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1644
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1644 CREDAT:82945 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:4060

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\69C6F6EC64E114822DF688DC12CDD86C

    Filesize

    631B

    MD5

    5a813454bd2cb5e3321c9e5fecb5056c

    SHA1

    02937703479e284dd6638fbadfa33cc45ac34c28

    SHA256

    100e233f4d4e190240ff52081ca861c222505cf10367ff633494061f7763f4ec

    SHA512

    98ab39f780f2670401926087211ddf66f120a3cb142cfdaa454f3c14c32a0c66cfeac91cc7333be93b0513796b67f9cbd63316b65bc31d5acca099ae45d1e7e2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\69C6F6EC64E114822DF688DC12CDD86C

    Filesize

    240B

    MD5

    cce2211c5a703389621414636856053f

    SHA1

    c79444918bde4b031dc122b573585555ec935c15

    SHA256

    d0f4c5b196faa9a067c8046f069a8d8e316e8ee33b742dc308d55a5faa1875d0

    SHA512

    dc75f9c36f9b0458328e7d24a51f1834e08f28158967cb57f4beef498cd3f58d0fc9e8ff4783019d5b032439232aeea76d55a62dac5ed0c671257b6fbe38a259

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\96FUNX8B.cookie

    Filesize

    611B

    MD5

    62ff83348d89a72a19fb1d227e3a8e7e

    SHA1

    fc037b7213a5c2213fd0ecc44bae76225411e2d2

    SHA256

    4bf0fd2efd06959929df677e052eaa0e699f26dd0f5e2712c68a891699ce1ef8

    SHA512

    bb42b13b91140f58bf9b34e25fbb751b829f85c1360306b226fca9ee8a5c79059bd5aa0240fe5136af13e93dddac684fcf1db87c9ec646987083fa5b7411b0ef

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\UKJIGAFC.cookie

    Filesize

    610B

    MD5

    f8402ae9dfa0670a78644439019ee78a

    SHA1

    caab392b5ce227f92df276adf1965590c112100e

    SHA256

    b21b7d46049ed65281fa613f6c12cb651372b6781fb9072eee9e7086fef0c6df

    SHA512

    708470d6e460d8197fe5781bc824d7e778abf6ebab6663abfdca9e603959d3b5c92889f3abee5035a0c60f6ab2b43415601aaa6040b7bcb135f2250203c63234