Analysis

  • max time kernel
    64s
  • max time network
    70s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-11-2022 00:26

General

  • Target

    ATT17254.htm

  • Size

    675B

  • MD5

    8c6526d8ac0d53d77982ff294e1d9e9b

  • SHA1

    123b405174a7cd1422044e10a435f9976717b934

  • SHA256

    8360028e7b3a93aefba3e695df0a680b756485f37be0810399eb82cfb050225a

  • SHA512

    8cc3ca0762f889e27b623adfc8885f8bbaa1ee2ef865db2af37e7ad35964ac5486c908bcf4523b79ab856afef26a3716d508d3ddaef69be4d1014cb994c6a33b

Score
5/10

Malware Config

Signatures

  • Detected potential entity reuse from brand microsoft.
  • Modifies Internet Explorer settings 1 TTPs 25 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ATT17254.htm
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1200
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1200 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:4904

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    Filesize

    471B

    MD5

    870b615bd1f6e73bcd807d31b8678934

    SHA1

    6623daf15f495a66f0738c3c03bdbfd4bc7342d0

    SHA256

    186f4707b61526047271661adc8ffa8357d7a6ac36776d2c3bd1afad6a511fac

    SHA512

    774482b01beea35b1556a531dff40bbde7869225d9dbbde126b825b3bbc342e8529bcbb8f8c367251994ee6b28c41d33b2344bb6d03e82eae04bdee056b23c34

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    Filesize

    404B

    MD5

    c37710c9fd25607d6d1771c00285e133

    SHA1

    3cb2403fcd90b20f839eac5cf375f69fbebd43b5

    SHA256

    c9c5a0ee9979ba23ed65b0f9375b61f6e555bb3960a8ddbe14a00afd67237467

    SHA512

    aaf793cbae2eee9b843148a72abcafc7aae0c719e8adaca79b6c8a6b843ff12754dacb96d3da47f44d532f348471b3949ad5f57153ce60bbb6a63b357fcfe6db