Analysis

  • max time kernel
    132s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/09/2022, 05:05

General

  • Target

    sKw˪c餤/pages/confirm.tem/confirm.htm

  • Size

    1KB

  • MD5

    7d07f201b3ce1fc38a5a3b620c374a04

  • SHA1

    719e554ca4572799a7d06dedec368203f54748c4

  • SHA256

    ebd0bb2bcc13a6e36217a0a07bb6734f6cff2b4315cb12a14e5a40cdef8e4362

  • SHA512

    595b420e61a6e03f3a6c05b5b508a803d82550fb841671415eb270e0f8dfd733517a02d81919a79573fc13024b2b65f8075ffdd192978a9f0ea2c96f9c0fa2a0

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 44 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\sKw˪c餤\pages\confirm.tem\confirm.htm
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2472
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2472 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:3364

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    f6d292a2a65c9e87797c7b0fb3018460

    SHA1

    10b53657072ae3d240832b895e721dddfaadb6b3

    SHA256

    68851b0ab7e9b1a9af4944d0459ae8adf3531e9345d2629f99f0a7ee5b8d0c6f

    SHA512

    390095530172a02243c356b7d6049fd9b1da0e3a9f66918f0a2c1fee0ec27667724ab58266c46122ed6e5fd8389b5debf1ff0308285d136ce0cfcc7c3555d77d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    404B

    MD5

    b9fbd4930d621f5a9298309c884fdc32

    SHA1

    75d29120309f42fc86f5d1dfb2e5c0d9d6fd6bab

    SHA256

    666941f203e674c9573bda85a921a8e06fb8dc8922f7572c4f027a017b86e35a

    SHA512

    c3699c22875c80cdb22dc3f35c8ceb0eba3745940cb57bc9cfd4ee7770f5483b6bc7bb5ea15291ee53f8c6b739e8a67ee4da546a003efaeafc4c9256609b9566