Analysis

  • max time kernel
    74s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 14:41

General

  • Target

    readme.html

  • Size

    31KB

  • MD5

    a306f7fbd7d6dff5c113da140a54bf1d

  • SHA1

    c8bcd0fa089c7f40c1c9ad30b9d2929779ea92ba

  • SHA256

    d3ba2e901cea4c64087e997ca85391157e0a3ac2e8af70357286093ab0a4e8fb

  • SHA512

    f3cf638aad24a58e7ef305ca75109e7bb8f30c05b060ea98ccaf084fc096aec83e6a969bb454ad3e4ba5219bcda1f94a62e09a67b1a56f6a9d910b5a53544294

  • SSDEEP

    192:5rMu2rUjYd1cVhOSEdzKJL39h+iZe+6iX/qy9Zk2aFcReZ4dmKRC9dk3fS674YzP:2QywJL9ocPdmJk6WFzoCD

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\readme.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:5044
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5044 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2960

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    e32d02ce684c01ef3af05fae9066160e

    SHA1

    29c7a6e8ed553ac2765634265d1db041d6d422ec

    SHA256

    b00322d178a6cfc206458c26b26d6c80596073bb3283dcc3fc4e33a4b5f29d71

    SHA512

    e4e3175fb131095e4681ecb76d14dc74d059c0beafb6340965516c6d3d0538deb314b36a3f09df03b491edac84d5c0580e764fed1d8bca9abd4e65cb56167148

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    434B

    MD5

    da3d70dbf5be2027026814ae24d80a25

    SHA1

    e9bb7bc53f0215dc2d046d4bc259a30348f5e520

    SHA256

    a5ff1ecbc062c5f0a1737d092c357832a9dff5f2e203ef0fd761d9154aa1f007

    SHA512

    5d33da67470f1fbf0950ef5c17e7d5ca6102baf42d4a1f4e7d54d9dc4a292b18d6bd08d385642ac2b785906552e21a63a5724bf32528c0d8783d8dfd2d53f7f1