Resubmissions

19-07-2023 21:16

230719-z4frlabb95 4

19-07-2023 21:13

230719-z2sndabb89 5

11-11-2022 04:56

221111-fkt1bsbcbk 5

Analysis

  • max time kernel
    138s
  • max time network
    169s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-11-2022 04:56

General

  • Target

    var www html kemhan/category/berita.html

  • Size

    68KB

  • MD5

    b9f988d882234081c46cd744720fbe88

  • SHA1

    670f57b854e4352b71b45c08943de31271346e8d

  • SHA256

    d34c4e2745f3bd6dca312af32a14e38836e314906271aa4f02d64372aa6d969d

  • SHA512

    febc806f371a6969700a712ccbe1eb4369f13dd33fd50ccbc278ce945c75130c3f8582bbd5bb4459ad06ca4670d8cf6a8144c7cc49e153dfced93c64c4aad05e

  • SSDEEP

    1536:BPM+UXmC4BaAnDjYkBtCIRbOqL0PlLZd3MrN:MmC4BaAnDjYkTrN

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 41 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" "C:\Users\Admin\AppData\Local\Temp\var www html kemhan\category\berita.html"
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2560
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2560 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:3524

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    5114a2be461525e04050237e0c3cb31a

    SHA1

    ba51dbf19c29709997729a01b95b0078fbfa7e96

    SHA256

    b1a391583342eff94659a90bf0d1b5b196fcb9f005f1cb3212dbe87d2961769d

    SHA512

    904469b52d168125699a8fc9ce13996e98e78e151ce771fe2af25d4492970fb76278e2e7dd6e0fbddc7f8b2cb303c89a729138b2ba8236ea3050a7eff8eb318c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    434B

    MD5

    3c92df642d75500cae86887cd67477b3

    SHA1

    700e0c2e3b3dd3cca68889b5f669af2756cd5b96

    SHA256

    eefbb3a38dfb7734d2b9368eca961612dea125e0109f3fc0a5e316fc64f91321

    SHA512

    494b0bf61d89574324ce3bf54b8674b3fdef432bf85e8060e7950308c3edc93076f459de96f5b1872106c3efa00283a82cde5eadc63e29eb21d649315b46683e