Analysis

  • max time kernel
    139s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 09:29

General

  • Target

    37c4a555abaf87f73aafd0565e2b8bc64d467af7eefddef0e9d1b9070f062de1.html

  • Size

    7KB

  • MD5

    b51c2418b329d6a32c7cdd05a7ad0145

  • SHA1

    89e4b7855a8a490a447e3f41fa536812992c32a0

  • SHA256

    37c4a555abaf87f73aafd0565e2b8bc64d467af7eefddef0e9d1b9070f062de1

  • SHA512

    a6813c420fd3fff15efbb518cf831a661d67302b4998b7df14a7c12dc2bfd195bc31b3816d3a2ed8b2a78183e5f952e2d919be43bad9e7968b9907390745c933

  • SSDEEP

    192:1sJSG+9PzqN/PR1A8nddLXuSwSTLdlLXugfo2Ku+oLnUnd:1WSGabMPvLddLXuSwSTLdlLXugfo2Kaw

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 35 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\37c4a555abaf87f73aafd0565e2b8bc64d467af7eefddef0e9d1b9070f062de1.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3228
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3228 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:3512

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\69C6F6EC64E114822DF688DC12CDD86C
    Filesize

    779B

    MD5

    f7f91e1b9f9854e68845060656023e18

    SHA1

    1813deb4a5d6bb29d70929116e70e77087edfdfb

    SHA256

    227a33d83938e9524a0ec2990d26cf1df708dbadb8eb353d38f0adca99593028

    SHA512

    466f75996bd3d5d026a5d374a37f3ac7a29120f3c9b9300e256da3807a4b7df3e465d3ea0d352ff9af2de4ae622eb2c5998d3452d6cb15a180faa85f6ff154ad

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\69C6F6EC64E114822DF688DC12CDD86C
    Filesize

    246B

    MD5

    0f944d76d3a0a67372f6f0054c2a8d0f

    SHA1

    312afd90ca525d6b27b8a02beea5ba8ebb1ff33c

    SHA256

    aea4d4e6414040d1ab64afe2b93fca67a2a904177fdf7822e8808a34ee106a67

    SHA512

    48518867c743e67be07aae7ae964028ab9ba2db9a3e1dc47517d7a3a330b966f57a52e647d9dded3ba9c4ff32cee5521877c93fb08829d196c1e4abd1fb5db40