Analysis

  • max time kernel
    76s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/11/2022, 02:53

General

  • Target

    03827107676a80fbb5deb372a4ed47bec33b92fa2e5fc71836e88ce779911dfd.html

  • Size

    32KB

  • MD5

    8668c56c76ab412e622c61a7d91399bd

  • SHA1

    b883a8b8869a390a9b219c819697c776b93e082e

  • SHA256

    03827107676a80fbb5deb372a4ed47bec33b92fa2e5fc71836e88ce779911dfd

  • SHA512

    1e111f2cd2ab82d8fa1ed0693b42d0cae8d921d811ea1e6aa33dbfa6591f84e73500343ebcdb80d4b8a43b6996a2e6ffb3daaa90ca2d4cde0569faa0f6e2dd35

  • SSDEEP

    768:YL+IHPf/fPev6mBPtfBmJ9TS18yvOoioe52huuP3UMUloefJMIlL+AgqJX4HD:YL+IHPf/fPev6mBP9BmJ9TS18yvOoio/

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\03827107676a80fbb5deb372a4ed47bec33b92fa2e5fc71836e88ce779911dfd.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4256
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4256 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2972

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

          Filesize

          471B

          MD5

          3bc8595d0a469edc8b7a071a3befe724

          SHA1

          f7e4b53b01d31626ab7965b267fea4457d798a91

          SHA256

          33c4b30d18fa3eeeed676831973cf8dd8c9a9145e7edcb689efeec0647d685d4

          SHA512

          4969ab6d2239a94d1dfb6105d9a329588ad0e3366ab4af874e033b853adfcadf808eced3466823136221e110accd2bcd5b25b0474b11947aab510f0b92d397d8

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

          Filesize

          404B

          MD5

          a68da102ce7d10a49039a4a4f2e2aca8

          SHA1

          a5bfeeefff190427c01b2888296441992eafe0aa

          SHA256

          f5a8e669ddbd96c1f8f835e350c9f384ce5d6e0b9f01ab5617d6bbce8bad23bd

          SHA512

          73fcf64fda5e5cd99ec4d106261c4b1572a22ee64ee1a2a213ad0ba2304b476f77c7bcd65448ea250cc2a634ea5ea908e4da9dcd18850f61490957b5cb856dad