Analysis

  • max time kernel
    134s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/10/2022, 16:12

General

  • Target

    626663.html

  • Size

    7KB

  • MD5

    db96652421c9082f306c522c0ee85ba2

  • SHA1

    0c38cc02949ef2a2711a8cc136f131d7c248ec00

  • SHA256

    f9aa131bbbe03cd725a66ae248e55e410e3acc72683730724b4efa87ce29e0cf

  • SHA512

    4cec8ecf21693e203248d01673f4fcd5e6b1c4677615870f081d721cb5a7add35a784725ef7f6fb457fe794384afbf3fee0574b6d1b46f0fd462fd4ccd202ad2

  • SSDEEP

    192:/0QR+uFs0sFmIVEKTJb8WahcH+yaqiO6Qq0e+9aWRiY:1RMAIVXJQW+s+ydp6J+3f

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 41 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\626663.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4924
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4924 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:4792

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

          Filesize

          471B

          MD5

          81c96dfdc78955baf5c089e53bc0c46a

          SHA1

          f648c51cd0d2d784d0e8d73c30d6474487162127

          SHA256

          397b12f65672c174b45d98e34e35a655b2ad506e7e180c7714abfac8acb30549

          SHA512

          1991d628ef5e1a0a457cea5ef46a29043ed08ae60727d340fe1a6a759bd09693a3b48b78c9c396afd336b2f7b115ee93c5f0dd1dfabcadb111d2928781e6c51d

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

          Filesize

          434B

          MD5

          dbc3d7c73ee5056ae35fa731e12a374b

          SHA1

          cd2dd217e2cdec953f7e303c503802b9d6176cfc

          SHA256

          5e22e05537d48a89f5d384657eb1e692ccd7417df4705c9de3cf6896b6900258

          SHA512

          d6e662254df6c8fd93c8fc3246c96fb64a1c071f67fe2d41892e63679a63911ede4039b6e76bf564ac99204c1f9465580dfcb88a7c1cb883f354278a0dab23b3