Resubmissions

08-11-2022 20:42

221108-zhe8yahgbp 10

08-11-2022 20:40

221108-zf9prsgba6 1

Analysis

  • max time kernel
    84s
  • max time network
    89s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-11-2022 20:40

General

  • Target

    Document_5299_Scan_(Nov8).html

  • Size

    1.8MB

  • MD5

    a46b05a1216a108488b58928479511be

  • SHA1

    a25dfbf1575d84052bf0c626847c82d74cbc7849

  • SHA256

    2452568dc5962012a3c2e30223a0ca5e0d64013292f9690d00c2171020f8614a

  • SHA512

    bd86ec6030b715255df556a451c15880eea7b7b471e44f042b8092c6882c38c65fd56c266e9d93d62cad22c386ed92d5a52ecff57144faa4ae3cb3cbd41fef08

  • SSDEEP

    24576:N2XNH1C8Q24oABK7UhqQiWlQPbFIZqbOXHFaT/OdBowgTIF/rxK8rvp+sJTq0ngG:E9VCHZBKiqp2iEaq0/Elg8rR+Kq8

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\Document_5299_Scan_(Nov8).html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4684
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4684 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:5092
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:2648

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

      Filesize

      471B

      MD5

      80f22efce2b9390a36eea98657b6d1f4

      SHA1

      150d40f67639fccd130d8616ddc0cf623b491905

      SHA256

      227fafbbbd678543e247cfdbf8b5ff60e8fc576da70c2a3f0f735cab2652dd2d

      SHA512

      e2dc713b48477f7c98c0a0d42306745133476876805b4861ba1d76b11f3e9067fc83f3bc6ea350c1298f54dd3ff3ec00e0cb08fff5618df7d0f723900b93ddf4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

      Filesize

      434B

      MD5

      3f2f2a3a7996e332aa4979341b93683a

      SHA1

      301529c1d0bda673cce3cb57d92762f678910deb

      SHA256

      483536325c33a9e2a960fae117032e3d626cd956d4271f92259e33a439e654a1

      SHA512

      d4325cb190c2d1548ff259da1f25e8d053ee33e0e747bba6d7a79474c932dd154f6e8b4bd7f250d766f93b43fcb3e404e1f7d2166c14a7cdf1fde0b40fd206c8