Analysis

  • max time kernel
    84s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-11-2022 04:20

General

  • Target

    baa4bb2a18bfdacfd774c64f012da009760684e0ee91a44be03389c41894ccff.html

  • Size

    7KB

  • MD5

    2974e5ba2154f787959f55bd4244551c

  • SHA1

    de37913b7f42ddeee269b005beb7caa537bbd902

  • SHA256

    baa4bb2a18bfdacfd774c64f012da009760684e0ee91a44be03389c41894ccff

  • SHA512

    5259f3f99de3f30cc376281c869deee8c2b97ed3f4bce60d0f51aa5a65e36de7ea6a786ea1ad473894ccea04a87a3798486630c1c85e488669805859157d6ab6

  • SSDEEP

    192:HJSG+9PzqN/PR1A8nddLXuSwSTLdlLXugfo2Ku+oLv:pSGabMPvLddLXuSwSTLdlLXugfo2Kav

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 42 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\baa4bb2a18bfdacfd774c64f012da009760684e0ee91a44be03389c41894ccff.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1860
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1860 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:3580

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    Filesize

    471B

    MD5

    33b7e09d1c6e875887fd38ae0a7ee659

    SHA1

    192864bc83504fafbd87af8c3834b835076c414a

    SHA256

    f200eaab5663e542461bbae7aac0473f6455eec451011f016c84920520b19dfb

    SHA512

    b1d6872519f5956bb511b4eca8e1b79123482e9aacb1cef704c1d3ef7f9daade10573dd206df4c62c623bbfb10f757f01c914bfc2b0e9ab567981ea08b404799

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    Filesize

    434B

    MD5

    ff38af412c4d084a750b3f452b701f2a

    SHA1

    7f099416fa7329e96ef37c962dff9773d03814b9

    SHA256

    4979095887dcfe00c2e0e2dea41bd1b2bc39f27947bdc6df1465bbc799e88baf

    SHA512

    253a8faf98da3b899ad4d362a2e8a7704a46c4f746ebca0853452ce53625d3bb748185bdfdf3ba9d0448e96e10c234984ece848e5832935ec6c555f858b9b039