Analysis

  • max time kernel
    153s
  • max time network
    161s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 09:13

General

  • Target

    cfc8b3e71e161c97427e64d53da85c579341bdce8935aa06824f5cee8a6bddb4.html

  • Size

    7KB

  • MD5

    073e4f15d06d1f23f80c8af288cde961

  • SHA1

    64da3439d1274aea03cdc7797344fef57b6ceaa4

  • SHA256

    cfc8b3e71e161c97427e64d53da85c579341bdce8935aa06824f5cee8a6bddb4

  • SHA512

    87df15abaf82245ae545730bd19b0e3c5c3f1d2e6b7eda42317495d9210c3cbc1771e95fd8a5a318725f3d668877564a7129f9accc83bca1f148bc991fcb89d0

  • SSDEEP

    192:yJSG+9PzqN/PR1A8nddLXuSwSTLdlLXugfo2Ku+oLq:8SGabMPvLddLXuSwSTLdlLXugfo2Kaq

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 2 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 37 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\cfc8b3e71e161c97427e64d53da85c579341bdce8935aa06824f5cee8a6bddb4.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4904
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4904 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2656
  • C:\Windows\System32\svchost.exe
    C:\Windows\System32\svchost.exe -k netsvcs -p
    1⤵
    • Drops file in System32 directory
    • Checks processor information in registry
    • Enumerates system info in registry
    PID:796

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    416f43a5e5978e25d0b2b3804604f9eb

    SHA1

    71da8e406f52bb253c6b3932e24038dd593521a9

    SHA256

    457ae2aca2600e218804f138f83fb6f5ee451a0694cff806f97f15f5b00b1917

    SHA512

    0ece1d0ffa3cebd377155244da084f25206cda3ca499adf63eceab3b157598a2e290352120900563ece8938183b2a090dc527461eb4a197310abebb82103fecb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    434B

    MD5

    e04b89109dcf55db87c6cec7f6cd30b0

    SHA1

    b0ad72774f078fa2a916adff1ee376097081b0ff

    SHA256

    17255db469e68513674c8e27672b52534cb6fbfe0f716525c1ab8e4045464b90

    SHA512

    33fd66e6e8551de330ae3ecf595e90f4d3375b44fe55cee538962fe5dda7703bc31c1dd6ec04a7ce106676d161ca5bcf9de83ea942aeabefa93349f1d56460aa