Analysis

  • max time kernel
    90s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-10-2022 06:55

General

  • Target

    Windows 10 Anwenderhandbuch.lnk.htm

  • Size

    20B

  • MD5

    4286e54d811db66da6fe1f3d8a686ebd

  • SHA1

    24c2174f8d5374bf56207bca8161d794b2a5d034

  • SHA256

    40ab2be95b394ed63c194ec6abf15fdf443a3c415024db4925e5bfe5b7bbee6d

  • SHA512

    625e71c533922c65740e7951d78b4c2b3b7620479a5fa08db5b035ce775c71510d4c35fcc3c23f21b9500812aea1af80424b6ffcea5704814a7ab8b6d0664294

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" "C:\Users\Admin\AppData\Local\Temp\Windows 10 Anwenderhandbuch.lnk.htm"
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4788
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4788 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2200

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    77a5fe334f666d4abee341d464457838

    SHA1

    0e31de696f343cf8565ec3de87a236a66a8b5d64

    SHA256

    bb07254543e22422027fa5f3c7af9e2b5a6b69bf6925fc1ecf128cb27e9a6dd0

    SHA512

    50cfe44a977775350ed5e98e39c21b2d43321eabd0f4dfbdcf2644f41d8c6fde9b96e480a34e4665c021a315f4db031e90f3d84cf46ebecc5161032a63da74d0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    404B

    MD5

    eeaffe8cd14e07043ea51ce969ce3e34

    SHA1

    4729a09e47a28b4d65aebd673a477f4cb974d12a

    SHA256

    d932d099b523d06b5bcf1c48673bfa629ff7f91a16de622317df8afdac64436a

    SHA512

    d77221bb2e3028fe8a4a3eeb4bac43d72cae93ea0486588dc28585b4d341be367d56aedccba6154ed10745817584ea22ea5eb544a67b5328211896f8a7eaff1f