Analysis

  • max time kernel
    132s
  • max time network
    224s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    10/10/2022, 22:18

General

  • Target

    fe6d087e1e064aa3fa0918324c0e6ac2a179c61232c06ad8c2a0bf33bb024d73.html

  • Size

    6KB

  • MD5

    0fed01b08fb041aca514f60b34f30cb0

  • SHA1

    6367001f179967be822f2f8f29dfd3f2564b3fba

  • SHA256

    fe6d087e1e064aa3fa0918324c0e6ac2a179c61232c06ad8c2a0bf33bb024d73

  • SHA512

    8a5502701fabb6a20e15b2a3463e8e8aac58a354453af861b1dc95a3c534d6373bc06a997cf174f633ee7ba434b1270ec9e5233ecba5c7f97120cb670c60670d

  • SSDEEP

    192:uCgUXmXbXqW0N0v0CaBz0wY8yr/kf2jRnQ5/e:uIIr/kG

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 49 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fe6d087e1e064aa3fa0918324c0e6ac2a179c61232c06ad8c2a0bf33bb024d73.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2068
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2068 CREDAT:82945 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2448

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    fceed7a5f76725fb398c6a91ff552899

    SHA1

    237aec000ae7c7c35a639664b1ad6c0d842a0749

    SHA256

    2888c66a6908f10474313b2fef31aeeff40cffe1bcbd19b84b29334ff6a71383

    SHA512

    adfba4e72523d38395c13122d6498d9b48d93b2967858f0208549e3830c9b47ee3e98249b98fe585aeeeffe491a6985a98c80a3be581abccf4239bad4d1cdef3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    404B

    MD5

    44028b4ed0352426122688b2657a4096

    SHA1

    181a522bd5a746331597e81f3220dde4c3b186a8

    SHA256

    b6c1fda862f632e5e0a30c6667be8558f6fbd929a5bd05d1bd28eb3c27445974

    SHA512

    8e1e0b2b08a414bfb9214deace98bf02e2d2ff72ed28301d7ceff42b673921fb6f6d211df45d46563dff545677909628bf60da1985e1fd12027e53b57fc85b0f

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\27N753Z9.cookie

    Filesize

    606B

    MD5

    14a8dee0a84075d3a7fdcf5a88cda9ab

    SHA1

    3fabd03e9248d8c4a90b76bc6f1c420cf0b94d3b

    SHA256

    850db6cdc88b697531cc519e91b0ac8237f97be3291fe4dfb34ae1748ec027c1

    SHA512

    775257a29138cf5982913df54d2b03bba122d4555831699a3205d8dc834119f88666136068a76fc0d405d4f4f4f0348654befc099239e1a05dba49a651be94d6

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\YR3RLF63.cookie

    Filesize

    607B

    MD5

    d8300a0acc17b20b669178ec15772953

    SHA1

    8f04c58f0a7eef6432139966bb6a1194cf68777a

    SHA256

    5fcb21b48f15c57fe5717869c438e77f3553153aa8c04a98c0fccbc84e28b09c

    SHA512

    ad996bfa0d916b9bacfe9d66ffaca6620e2f81f9b664beb7f76c5660ea1605315d312bcebf1b4778f038b577b45c4c3729a95d6873d33b7f4129ef8451d27c0f