Analysis

  • max time kernel
    144s
  • max time network
    148s
  • platform
    windows10-1703_x64
  • resource
    win10-20220901-en
  • resource tags

    arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system
  • submitted
    12-10-2022 13:50

General

  • Target

    aaaaaaaaaa.html

  • Size

    154B

  • MD5

    9cb953883c6f4469434913e495632e25

  • SHA1

    fd448f7b5c29d2d682b68d764895fcbdf1bdccef

  • SHA256

    28cc7b0a1d961a19a0a0611fb74361563f8f7adbc89eea1f9cb0a29d7c862142

  • SHA512

    5518fea7a4313d62d268f81c22197650f99ae22ac8d4b748c24c4117037a7d97524281ec3cf1ce39521db226b911ae1a1cdfcbe3d80ef0a23c9bcd864dee1ef5

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 47 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\aaaaaaaaaa.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2172
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2172 CREDAT:82945 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:380

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    957d711ef13aae49d723c4d2b1d4fa37

    SHA1

    aa818a5cfb5ce97987c05c8f20866cbbafb4bf93

    SHA256

    43184ac9a857febd19b97a04797528a7de0c15744ae3d540e23cc4b5f1d2641b

    SHA512

    f5c8fb180bba40d0755c909349bb960be5b8242de651237b9c2368d74accbf845f3cad131ff9b80f71745353dd11b53ddda7fd5cb928a2f543be217b9e975030

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    434B

    MD5

    aabf2ac8d59cf6da4d6ff88703ee5ca4

    SHA1

    5ea4f0d338dcd23ea8f980e0a07e9c725cedaa4b

    SHA256

    330339deebd6d4bfb086b9943f822d7345e6c60cb23e09193984cdbc3791bb23

    SHA512

    e3ec9443add88f36496f27f35f80bf231cc1ecf4b110b6e24e5946539d7a037fedce86b7c93519e6cd9009aa2197996182dc0ad45feca47e3a9d6a9d17dd238e

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\C4H25Z60.cookie

    Filesize

    615B

    MD5

    1c34d2afec0b0cb4cd0db3c754506cf6

    SHA1

    bbfd4767b1467b48947e7a09a6f1778666afaaba

    SHA256

    579396f65989647447df8d2a8b277973f2222686877aecfbfde5299f18787afb

    SHA512

    3830c60dcdacf405bfd5c7e8179493d1dcd2de5c0f47de5fdb49ca9e13cb111576c121c475892b48c7f7821bcb18f44c762a8affc1ce5bde4e4fe9ea5128d0d9

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\M9QLU9B5.cookie

    Filesize

    615B

    MD5

    48cd69dabf8c71e8fc202298f4083294

    SHA1

    1c225469588ffa1bf10d5367a4abd7c7f48e75aa

    SHA256

    2d23d377f26aa63e371c3237c61a44c5c58e83bce1c613c104723cc910f78772

    SHA512

    d9da19715da2bc8b30e14f881db08f8becebdd43cd560a8515660d24235c81f168984a8bdeefaa26ef35c6093111c15b4697a3c5c7ba73e846b8b87676a0e78c