Analysis

  • max time kernel
    142s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-10-2022 18:10

General

  • Target

    RequestedDetonations_0.4E74C4.html

  • Size

    940KB

  • MD5

    4e74c4c6399e2b709854e85f80a13a7c

  • SHA1

    a67c58f65014ddc6c9f7b6b39293bd1423ed48ca

  • SHA256

    20031e86a14d773e54b6d5ad53ff84479ae0508f5fcf9c299ffe311a00d0434b

  • SHA512

    04e0ef3b3219104dd8096fbefbd7576a5713a9bc7e857e8e3184a4da762c4ac8863a0ea8ddb61781ba8f1113bf64750b84ca19c12f02c597928b7b772d1ab212

  • SSDEEP

    24576:+8IytJpcu9Ddw+CP6zNF/j1jXhl0LJkq6:+8IxLSzNNx

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\RequestedDetonations_0.4E74C4.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4240
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4240 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1484

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    460fe13d503bfbb113c3ecee607f5a31

    SHA1

    52df07ae073bae09b9093fe2c60ccbe7e8dc47cd

    SHA256

    dfd7a4b3a98874808e3623cf75216dacd47b4389916e0faad7e0ed289743ce0b

    SHA512

    383f29a13884ec9268eaba1ee47bb73243ec7f4eabdaacaa77bdb2de2b0cde5f000b7ea527179c75cfa30666a06a9333268e06b4cfbef91f4d2b82c119818d23

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    434B

    MD5

    8ae47dbe1dc1701db3fba0f6ef675838

    SHA1

    126d83317f4bbc4cc23b6c4a9805dc129e8f63ae

    SHA256

    a28c20fe44f66ea08fb39c2342ea3f0ecebf976e1bc47215394517722e6e0995

    SHA512

    675e263efbb2a938feb2c1feca539b55167bd2345ac0913d30800d7179e67c2f3c51b037fd5696b61c26d1d58182742d53fa5292960c66e11c0100497df61ebc