Analysis

  • max time kernel
    133s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-11-2022 17:45

General

  • Target

    Unpaid_3945_Oct31.html

  • Size

    245KB

  • MD5

    972114244ef633551cd0eac54e17f144

  • SHA1

    17806b97e908d7ab562e49a6a3583132abee5706

  • SHA256

    eca3ef27738569bbd0d4b577da6848068769e8164d7b3276c4867f3343a8c948

  • SHA512

    1a2ad13c88839b436ac83ac3a7cd5d6d82af5ed35c8739c627b6bf33c63e9331665fd4e2c3d6238692c23c70718bcad89f21603b0c40e259d222c7bc299d2b4d

  • SSDEEP

    6144:QVSATLIqgaQHpV3kvjSem3N/DkSf3Yx1VJSxt+ooYum:ADTLyOjoAK3Yx3JSxcY3

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\Unpaid_3945_Oct31.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4964
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4964 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2820

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    Filesize

    471B

    MD5

    80f22efce2b9390a36eea98657b6d1f4

    SHA1

    150d40f67639fccd130d8616ddc0cf623b491905

    SHA256

    227fafbbbd678543e247cfdbf8b5ff60e8fc576da70c2a3f0f735cab2652dd2d

    SHA512

    e2dc713b48477f7c98c0a0d42306745133476876805b4861ba1d76b11f3e9067fc83f3bc6ea350c1298f54dd3ff3ec00e0cb08fff5618df7d0f723900b93ddf4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    Filesize

    434B

    MD5

    7f833d77cbbc76fe6b6307b1b602a7ad

    SHA1

    19928d8d4a42f760f52fafc4364a5661c8a0c63c

    SHA256

    17f1e8f5dc346a7e9400e33810eeb02d0bd4754e68a31b9e5b301c6a9818a400

    SHA512

    c2851021bf073c21c87e3f49acf53053674f5eb3845e874da87a7de0a54ea4f94f882e42528bb3b65b00ff9ef68adf9fd3e04fc8550ae19df7e24fe7e4817292