Analysis

  • max time kernel
    89s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-11-2022 01:39

General

  • Target

    DPlayer_lv/loading.html

  • Size

    756B

  • MD5

    2a15ac04b4d974a1c261bd3338e61660

  • SHA1

    3ba2a057549600e9ee897d9b07d58cb221b06b3d

  • SHA256

    32fdccd985e110081008c24f7301e53e73d242c40da240280e26b64aff8ca4bc

  • SHA512

    ed8fa8f0aa16e9d27f53f50b0f92583f5f84e5122c0c672fd5cb988e0081533227c03311df2b2d6732e4b00c26cbab3006b5c9cd89d051a5bcdedd5d49f5b536

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 33 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\DPlayer_lv\loading.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:5040
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5040 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1008

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    dedb504b3469b24ec0df79c68f5772e2

    SHA1

    177a8b1045b456316ca32d90aba942bf34774c64

    SHA256

    e18111fd56db31f02eb16990f0bbc7991a0c80571703281ee66010e229c9f8b0

    SHA512

    101312fa01991caeaef010d0d21e740244cb3768490a1b82ae12e7524e50b6e7f2e23c08978ac4c373e9013baa0a8f50de8e1994341556b78ecd88ce13df5680

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    434B

    MD5

    f8f89c158d9cbb9cc139c41698a023a3

    SHA1

    e09ccdb26486976176a9291fe7d5f48ffec4402b

    SHA256

    9f908c69e262422223282740b2f9d6a62e8bef61f9f852517e3eaed8f1a6afd1

    SHA512

    32e6031554cec77c03d42bb317bdbe7a98a3716f606b17692e039cb9f299672ac568848b98cf5cc303b12b37bba4bee8cccb9984ac0656585a2df924527b0e24