Analysis

  • max time kernel
    85s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 15:45

General

  • Target

    NEW VOICEMAIL _MP3_11232022 25936 p.m..html

  • Size

    39KB

  • MD5

    82cb509dce972d0c834475573048f4a9

  • SHA1

    97aabb4fca657974ac087ce124582f8eda87bef2

  • SHA256

    8f3a8e6d9bbe1a0e3334ea41709735bbd8a7458bd9cf90b2b77a62f5a7eadb05

  • SHA512

    2f04c313e5773fd1d28d206a40b184b62607ff9be40e7adab1153f2d332eb0a632b1b5edfa6e65237c36f7004069c61f041bd2c169529f240e462cc548c92742

  • SSDEEP

    768:EEPBVC3xkND6RLuQluKYEpj/Kb5F7C4iwD3MJV1bOWyp:EyBVoxEKLr3pj/KqTiWyp

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" "C:\Users\Admin\AppData\Local\Temp\NEW VOICEMAIL _MP3_11232022 25936 p.m..html"
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1656
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1656 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:3540

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    e32d02ce684c01ef3af05fae9066160e

    SHA1

    29c7a6e8ed553ac2765634265d1db041d6d422ec

    SHA256

    b00322d178a6cfc206458c26b26d6c80596073bb3283dcc3fc4e33a4b5f29d71

    SHA512

    e4e3175fb131095e4681ecb76d14dc74d059c0beafb6340965516c6d3d0538deb314b36a3f09df03b491edac84d5c0580e764fed1d8bca9abd4e65cb56167148

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    404B

    MD5

    2fc232eddf115061ca112ccc2a5738f6

    SHA1

    0dd0fc13b80c91b5317b24324e96c4df7d0083e6

    SHA256

    0be2e1bbae8da49b1a3c29174536241d7da82546b17f4a9c8ffa6fe588c45c22

    SHA512

    238b81410fb854e34fc7f307990e3e3a6839376eb9ac31e8048e1d44a27907ff16a62e60c6fdb183969f7fa751a7217d610831eff71f45e2220e8ae691c992bc