Analysis

  • max time kernel
    85s
  • max time network
    87s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-10-2022 19:37

General

  • Target

    INV-901926.html

  • Size

    253KB

  • MD5

    87a4e27f75284eda44b34b7a76524ca6

  • SHA1

    3ecefc2833ffafa0ac48da02bb2036f8763871a8

  • SHA256

    2134f796122f8a17b3f6f9d838cb11a705a44a47c732b81ba9ac982c65b966c3

  • SHA512

    b33e8fd914188feb7ca293811584e9c5910c52e17bc5adda9121db104d8f34c40b45e744eb248810ae0d6a0950851d4ddc5166a907ba2c5a1c55afc81cf1f9a2

  • SSDEEP

    6144:nrDYKFE6P/KlSwe1BBuCpFDN/mht1g+OQ9MKtL4TGDL:QKFE6P/KlSwe1BBuCpFlWng+ONK9

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 48 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\INV-901926.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:5104
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5104 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:4452

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_1DC6D7385EA816C957BA2B715AC5C442

    Filesize

    1KB

    MD5

    6a9c9aaad47a858879a5655b175825c8

    SHA1

    abc975901328de8fb531ad26f83cb0623df4f04a

    SHA256

    556c28ae4e43812b99a48d14e20d647bc6af0f293429e3613c1abcfbd249c16f

    SHA512

    53b6eaa7a82b57f645ca912c971788f960be6895f8cbea7b4bad406fd2163d201b76e133fb096f87fd4be3bb178ef0d1039662f960070bd8965bb0f0fe84adfd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    81c96dfdc78955baf5c089e53bc0c46a

    SHA1

    f648c51cd0d2d784d0e8d73c30d6474487162127

    SHA256

    397b12f65672c174b45d98e34e35a655b2ad506e7e180c7714abfac8acb30549

    SHA512

    1991d628ef5e1a0a457cea5ef46a29043ed08ae60727d340fe1a6a759bd09693a3b48b78c9c396afd336b2f7b115ee93c5f0dd1dfabcadb111d2928781e6c51d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_1DC6D7385EA816C957BA2B715AC5C442

    Filesize

    416B

    MD5

    b94dd6646bc591513fbec3b54be4dbae

    SHA1

    37219c99898e0e3ec5f53bf135701e33399877be

    SHA256

    5259d5672dea77fbc50c94e21578da52ccf48abf39d03fae01b6fbae0979ee7d

    SHA512

    d9d837fc876a0455b8a06ff8d80edfb06eb73da52a6cb60195f8388a321dfbffb2c389adb1435195b776d1e75dc190814ee2695eacc0b1f6171d86092666f967

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    404B

    MD5

    706408683f9db957a4c5b69a811a428b

    SHA1

    23910842fc164124c7869f7ff6a14f99fd9d0735

    SHA256

    5aad18eac4def56a332a568880b1258f9092d1dfa15a3e3d786b519f728ab222

    SHA512

    3a052142dfce6957442b599185b99076a26bc343181d7aebd32b6f22e99e1aee85366a77c23e4545f897103e36f1f5be2c502d58d8132808e43af709704c3ea8

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\z2evvp3\imagestore.dat

    Filesize

    8KB

    MD5

    8d07f3fe8d7f9039217b3f86469cb948

    SHA1

    0e511b4c0432b23d1b18bc6d66448b64558d92c6

    SHA256

    b9f43405e122a37896d6b99655accd1338ca7efd6b8323109b2abc456c7cd9b8

    SHA512

    4d0d7321dc0cd85bf44ca559b9cef2991602da55a6e62b847de4cdfadbde2dd3cf2046a76235d8f9dfdbde5f44a2e4ff9704a26ddf917f33efff5a9f956846e5