Analysis

  • max time kernel
    165s
  • max time network
    222s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    09/10/2022, 22:17

General

  • Target

    637b092ede4ce9ed87a3501a437ac11c375b7d148d2e32e594e7ec9302254548.html

  • Size

    6KB

  • MD5

    cd4cc47bf10db82fc55013d640604ea8

  • SHA1

    d58db0a392412a5c98743471a07acc76a709bf44

  • SHA256

    637b092ede4ce9ed87a3501a437ac11c375b7d148d2e32e594e7ec9302254548

  • SHA512

    1d00cab5fccdaed0dcab12950e11d15d6313f98c63b4bc4a5900c68cf7a677d311eb030090a63ac3a471c238bb787e6b4d5858f21b5dcab8d2977c7e1b66fcd0

  • SSDEEP

    192:jCgUXmXbXqW0N0v0CaBz0wY8yr/kf2jRnQ5/e:jIIr/kG

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 49 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\637b092ede4ce9ed87a3501a437ac11c375b7d148d2e32e594e7ec9302254548.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3992
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3992 CREDAT:82945 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:4988

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

          Filesize

          471B

          MD5

          f353d5071a9d2a4db6413b4d78a761bd

          SHA1

          f9a1b1bacbcdbaf3902f1529c7ccd23046438c01

          SHA256

          fb240094bd6b8ec9dd17df602c669c4b642b1f8acba065924ea5f0d169937ac5

          SHA512

          ac4f8feee797cf840a8f872aa14afd7d44bfd0533c4ec76ef4aee67eb16f58450bed4a0f4e007450e78d79cf33b3ae06d8d82825c5f0cf7a61fb76f741013dcf

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

          Filesize

          404B

          MD5

          7fd638b25ccacff3b66d3749512337c3

          SHA1

          ffbc1def78a5e4e3483236902c494ae6643c5b0c

          SHA256

          84e7b8a7e39df20ac93717a5c60923d4974fc7368f25c769e24b90c4f7cbc9d6

          SHA512

          6f2175aca38d252ad14a688c7bf30b318869e0ea25e39fb9eae55a59db94f449ccbb3f152399b2669f654ab4f2023d931fe39996e5189e2144ef9f345c6fe2a1

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\4Y545GDI.cookie

          Filesize

          615B

          MD5

          604539882764bbeeaf4f7c3691f9ebf7

          SHA1

          a2e2cce0f345b227dedb5e78208329c258e9f844

          SHA256

          124c611e4fc3f260c4819bfdca077a9e41a3df9ac84d16bbcc098ae8e25ebe78

          SHA512

          e013ac9bdf8944af64579715ac368c8b9a88abc99c44c727d342a9d051d7273e8ea976e244e60602bee43f73002092357cba76e2eaed0ad1c14325e357585ae3

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\ITBX2RUZ.cookie

          Filesize

          615B

          MD5

          1616bb68e434d2b867e2cd584ac115b6

          SHA1

          21959da57ad3992c29acf8ac8b5dcfeedc14ddc4

          SHA256

          914a2f05736e535125d1fd5fb94766793526d28c2869ebda6d672944cc430743

          SHA512

          364fdb77c39f26d87cce443eda160a70087bbf9d7b9922648aa75f4e3bae22736e4bb210923ee7a58986bc02128ed705d79836880be0fb363970eaf81fc26718