Analysis

  • max time kernel
    133s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/10/2022, 09:36

General

  • Target

    Payment_Advice.html

  • Size

    23KB

  • MD5

    32fe621ff47d65abe65ccb810498db44

  • SHA1

    868b7b24d057a612c9dfdbd9e877a78ff23a1eb7

  • SHA256

    53b0c3b9f6c09485533c1d3508c3fd45854e8ed70a42a93a626f96ef3f18ebed

  • SHA512

    71acc2accf81bd6728aba8fd80e3a0b7f55ced02cc25e7b8bb41382575e2c2ae30ac61179aa5380dcc487f34763f795ab6e4a785ca99c406ccd98a7e77431656

  • SSDEEP

    384:QotHBCjXGUdHdDj9xVOo5ZCYHQlfOjkTnHzy5WUeWS1Z4suxuqvqYz8KCGYMpUsb:Tc9NdDhj15PHQlTTy5OtDs/vxz8aBpU0

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\Payment_Advice.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2784
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2784 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:4992

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    fceed7a5f76725fb398c6a91ff552899

    SHA1

    237aec000ae7c7c35a639664b1ad6c0d842a0749

    SHA256

    2888c66a6908f10474313b2fef31aeeff40cffe1bcbd19b84b29334ff6a71383

    SHA512

    adfba4e72523d38395c13122d6498d9b48d93b2967858f0208549e3830c9b47ee3e98249b98fe585aeeeffe491a6985a98c80a3be581abccf4239bad4d1cdef3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    404B

    MD5

    0ec4a8369a5bc2795aa9e433049025ec

    SHA1

    6175d2c9f7de8c893adfd45207faf47cea113621

    SHA256

    9ae004aae12b9bdc6ae0f5252a266561b987bb9765ee27f3e4dc38d09a418b6a

    SHA512

    286cea36af60c09973e8a96d8b622ce3be1827b40ed72dbdde92509d5803915e2f2b33636b8d52fad8687d07e35bbfe52726c9b0671a884105774e62ee64f2b4