Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-11-2022 15:54

General

  • Target

    email-html-1.html

  • Size

    806B

  • MD5

    6e199f3f36a169836fb432d3cf9204ba

  • SHA1

    0656ffb4fed71f4443cb4f9c03d345d149e30c09

  • SHA256

    75cb9e9220bc0f2d14c767403502aea6b3c1f82bc696a07e16731ee08269b182

  • SHA512

    52e5b467269a214a29b4d0bf29735b567b534fbfe277dafd3aefa4ff4116fdfda701fbf45d4c44654996081b964ff9f918dadf93101eba64ae8b6a045ca2351e

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 41 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\email-html-1.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1368
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1368 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2040

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    Filesize

    471B

    MD5

    bd4f3cb3175ff83bbc2c827705950a60

    SHA1

    9d940539de8317a8a6444559d9fc9f190dd9f80b

    SHA256

    ff821119d7d2bf9d795503ed63996c81611b84cdcdacac943da9a9ae2d0d2384

    SHA512

    02b99cb5a7e2cf6004fd010c5718f85830aca7b6f43b5ed929d2df8ca4209a29cfd9e54280a35392b2617ab58e578c097834ce24e9baa8b226c6181c64c0d377

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    Filesize

    434B

    MD5

    21525242bd3b954056b754841c94be30

    SHA1

    903daca536e07b600d726c4fe5bac2e7ce31b509

    SHA256

    e2c347afd701fa48b4a62a4020c9c41ca94a336bfc1206fc9b087c0b7000b59f

    SHA512

    c1101763dfa67fca19af4ae9d5de31d1f009c11da90a9bf5317fecaca7553e90442c3f990e8f7f43be3a5741276bc112f75aa9dbcfcf35a46e10d6493317a18a