Analysis

  • max time kernel
    69s
  • max time network
    73s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/10/2022, 18:41

General

  • Target

    INV-901926.html

  • Size

    253KB

  • MD5

    ae0bb6852954331c94af8c3455f58315

  • SHA1

    187308bbfdaea6c8486520c9e56981000d2aaa3d

  • SHA256

    9480c7a009a94671c3ef5ce09d95894da3adf3557065dcf970a8c218c32b80eb

  • SHA512

    16fcac0eb12011d065e98fbdbd3f3e7733874882144b438f0064fff0042a4a2cfa4e5f5e4f18c09d1f022bfe5331ab7d56c9191b13203249d653a4fda09503b8

  • SSDEEP

    6144:nrDYKFE6P/KlSwe1BBuCpFDX/mht1g+OQ9MKtL4TGDL:QKFE6P/KlSwe1BBuCpFjWng+ONK9

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\INV-901926.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4088
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4088 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:4904

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    81c96dfdc78955baf5c089e53bc0c46a

    SHA1

    f648c51cd0d2d784d0e8d73c30d6474487162127

    SHA256

    397b12f65672c174b45d98e34e35a655b2ad506e7e180c7714abfac8acb30549

    SHA512

    1991d628ef5e1a0a457cea5ef46a29043ed08ae60727d340fe1a6a759bd09693a3b48b78c9c396afd336b2f7b115ee93c5f0dd1dfabcadb111d2928781e6c51d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    404B

    MD5

    25653a7bd347475acdc443e42316c739

    SHA1

    36fd2a83ac8c7e8a78a47d61d3e8e212fa6decbb

    SHA256

    deed92d2bc4330de87cc61dc12ab9e5ef4c7d5c50b8fbdd1e205c8be7a3127e1

    SHA512

    198b4ea85cb5ef0a68f7d9793e394daa02ef44f20df4aa2b946827dc01a3084840a554ac91307bb5d674acd739bd3a6557638d37d5ab40fe2ed6d79742de4cd3