Analysis

  • max time kernel
    73s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 19:00

General

  • Target

    e96db402d1838ec664f7fd0d146f86161c981c8445b13178bd7779567fbbce59.html

  • Size

    110KB

  • MD5

    40ddab10ca3c8b92aa4ed464a03f1c70

  • SHA1

    96209e28499af68ab680369a541e0b7e492d68c7

  • SHA256

    e96db402d1838ec664f7fd0d146f86161c981c8445b13178bd7779567fbbce59

  • SHA512

    f9566455aa95e160774a2a956964493fedea15c6ff23aa3e6c0894bf07238bc52f68c94943547f230002d5ac44838400c4caae0be57861e755e504b3decc65d6

  • SSDEEP

    1536:MyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy9dGCsQSz:MyfkMY+BES09JXAnyrZalI+YQ

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 54 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e96db402d1838ec664f7fd0d146f86161c981c8445b13178bd7779567fbbce59.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3868
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3868 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:5032

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    Filesize

    471B

    MD5

    e32d02ce684c01ef3af05fae9066160e

    SHA1

    29c7a6e8ed553ac2765634265d1db041d6d422ec

    SHA256

    b00322d178a6cfc206458c26b26d6c80596073bb3283dcc3fc4e33a4b5f29d71

    SHA512

    e4e3175fb131095e4681ecb76d14dc74d059c0beafb6340965516c6d3d0538deb314b36a3f09df03b491edac84d5c0580e764fed1d8bca9abd4e65cb56167148

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    Filesize

    434B

    MD5

    b834808b1b1299ec0f04f3aa31f544f5

    SHA1

    de385dee3881b2282d064539e908fa59c11cfcc0

    SHA256

    1b2674a2999604a7e6331b6604b098eeaba661273ece6fb8d17b3fabec5cc05f

    SHA512

    6febe488ff84d00872b148aed90ee753f78122762607e79e56be8c729af59181eb8bd30288aa90388874734b52d2cead293e95ec2a5a5174e1e479c341bf425b

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\ckj4gk4\imagestore.dat
    Filesize

    9KB

    MD5

    f011bfa279ac8cca2f42da143a2c1a63

    SHA1

    3e1b722b9ee440f29d7f9191cc41d766cd53b2f8

    SHA256

    4ce79901630f35c492e554d61af57cb12c09bec6af1af2ec231a7e1fa4d8171d

    SHA512

    5db0cf5e3909c133b015f080b242887f81addab13952172e4cf6c57d73d5bc0dba864bd1813b1716a10f1faf3bb2987a0bbe5f79db7ffa14ddc12bd99443d1c8