Analysis

  • max time kernel
    136s
  • max time network
    182s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/09/2022, 02:07

General

  • Target

    iPRS導入包/App/FCM_Report/HTMLPage2.htm

  • Size

    20KB

  • MD5

    0b45f91613308b938c288948f754d57b

  • SHA1

    22976e850ed95f7ef15144378c9e4658320f10e5

  • SHA256

    2d79eb20a13b9b0bd76464b6d0d17ace1681513cd6eeddba1978b9cb60dc4586

  • SHA512

    e2585cc0fd96e77281e715a4dc8246cc02bb2a170a297c6878487379778dbde69cc6a9b51ef8eb813dcaef399168397d8a407d8f1388c0e486e54b1584efed25

  • SSDEEP

    96:H1/krRQ3qQ3IQ3yQ3GGJXQ3qQ3IQ3yQ3H/kr2rvgqcdvXrvR4rN8vZg:HE7jNzeX7jNervyvbvE8ve

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\iPRS導入包\App\FCM_Report\HTMLPage2.htm
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2296
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2296 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2236

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    f6d292a2a65c9e87797c7b0fb3018460

    SHA1

    10b53657072ae3d240832b895e721dddfaadb6b3

    SHA256

    68851b0ab7e9b1a9af4944d0459ae8adf3531e9345d2629f99f0a7ee5b8d0c6f

    SHA512

    390095530172a02243c356b7d6049fd9b1da0e3a9f66918f0a2c1fee0ec27667724ab58266c46122ed6e5fd8389b5debf1ff0308285d136ce0cfcc7c3555d77d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    404B

    MD5

    1a454c2640ff6129715c64ee945cf8e5

    SHA1

    fda625bb01144ef08ad16743abfe4fdf03c9c76d

    SHA256

    4e13ae28d90cb8eece5f4d324ded71af09c1649d80b342e6478da726cb75248d

    SHA512

    d13f189dbcaab059d3a82752f57945363eebe4393714d173ab9fbabbf97245248cb4d0b85625aefa5ec6a910e3077baf71cabc5322f761069b05e3db337b7e35