Analysis

  • max time kernel
    135s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 09:33

General

  • Target

    09ff8859888e7dca20b50816d3eb3e9c4e83a31049b8a54a69bc5ff1bf991ee1.html

  • Size

    7KB

  • MD5

    75ec7912e6440d08b85c56d13de34ca2

  • SHA1

    254cc5d8292426ef6dd18c6beca749e3de9cf2da

  • SHA256

    09ff8859888e7dca20b50816d3eb3e9c4e83a31049b8a54a69bc5ff1bf991ee1

  • SHA512

    626d8924f8535af9b4d4746e57ae3dc0dfaf27d22029a164f7a621b0d93f811adf7529995350f9a9c88a0f920163ab6c910a485227eabc50576cc608480dca5c

  • SSDEEP

    192:/JSG+9PzqN/PR1A8nddLXuSwSTLdlLXugfo2Ku+oLBCy:hSGabMPvLddLXuSwSTLdlLXugfo2KaBL

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 44 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\09ff8859888e7dca20b50816d3eb3e9c4e83a31049b8a54a69bc5ff1bf991ee1.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1824
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1824 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:4928

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\69C6F6EC64E114822DF688DC12CDD86C
    Filesize

    779B

    MD5

    f7f91e1b9f9854e68845060656023e18

    SHA1

    1813deb4a5d6bb29d70929116e70e77087edfdfb

    SHA256

    227a33d83938e9524a0ec2990d26cf1df708dbadb8eb353d38f0adca99593028

    SHA512

    466f75996bd3d5d026a5d374a37f3ac7a29120f3c9b9300e256da3807a4b7df3e465d3ea0d352ff9af2de4ae622eb2c5998d3452d6cb15a180faa85f6ff154ad

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\69C6F6EC64E114822DF688DC12CDD86C
    Filesize

    246B

    MD5

    6e1e3b82f34bdeee9f8c0bc4a1b54606

    SHA1

    374e233c20105396dad5de61bce5aa7adebc6e0c

    SHA256

    2eb83d345db5fb520b4cda7def236535c7e896e3c5445592248de053b3674bdc

    SHA512

    eb01eacc9364b17e72a7c6f7ee96873d430033bbacbde3dc9663c7f561059c8a5d3eade4c00eac80c488e0d074a829bec5a018841f45484605d61ccbbfc3d76a