Analysis

  • max time kernel
    142s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 11:05

General

  • Target

    9fecaa16bdabe6f2eab27ffbc73cf2148a2ee2f7ae1111b652749b6e32815ca7.html

  • Size

    1KB

  • MD5

    904ffe9ed09eae54da7354ed23615dba

  • SHA1

    ffd2475c106443728fa0df99d6d032ce1a005104

  • SHA256

    9fecaa16bdabe6f2eab27ffbc73cf2148a2ee2f7ae1111b652749b6e32815ca7

  • SHA512

    b1cc29f83ed4c78e8dcfa9f8750a5904457be8075e62cb84d5c5f980e1aec61eba9dfa3c5e62ff5d7d2b9f74b20c1750386ab19b8145af635cec64996882a6d3

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 41 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\9fecaa16bdabe6f2eab27ffbc73cf2148a2ee2f7ae1111b652749b6e32815ca7.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4296
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4296 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:4664

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    e32d02ce684c01ef3af05fae9066160e

    SHA1

    29c7a6e8ed553ac2765634265d1db041d6d422ec

    SHA256

    b00322d178a6cfc206458c26b26d6c80596073bb3283dcc3fc4e33a4b5f29d71

    SHA512

    e4e3175fb131095e4681ecb76d14dc74d059c0beafb6340965516c6d3d0538deb314b36a3f09df03b491edac84d5c0580e764fed1d8bca9abd4e65cb56167148

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    434B

    MD5

    554d34317df46af5a7f3a659ee602365

    SHA1

    562d58e05d53dae8c70501e998bf06d9c0da1a43

    SHA256

    c1f5d3c87b8f999125c03edce329b2bb4e20b22dc07e45a9429a5d06b8a1b64f

    SHA512

    149bce1e4f4d7622834f5dbb28165bb2cfa32a68bbfe0dda0c724a68dd2ed04a33bcbac3c2fdc311792114e47882260e87cb63aec38e461b16ecb61cb042d129