Analysis

  • max time kernel
    150s
  • max time network
    159s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-12-2022 13:50

General

  • Target

    555fb223ae84f6f29cd8068069fb4d6bd03ff146e5fc88384f883c7fc2492ca8.html

  • Size

    194B

  • MD5

    a6c854cd62fc9a4a159ee9f5cdca511a

  • SHA1

    18e05b661e7aac7c2cbea1fe3522942a6ef7a680

  • SHA256

    555fb223ae84f6f29cd8068069fb4d6bd03ff146e5fc88384f883c7fc2492ca8

  • SHA512

    dde18ed55049236adef1530542216f43ff83450b5109d82b67453d8569615ad5253815fa22f9671a9db52f25f25a6c2b002dcf986158717b96928a56c3ebf813

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 41 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\555fb223ae84f6f29cd8068069fb4d6bd03ff146e5fc88384f883c7fc2492ca8.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1444
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1444 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:5108

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157

    Filesize

    4KB

    MD5

    f7dcb24540769805e5bb30d193944dce

    SHA1

    e26c583c562293356794937d9e2e6155d15449ee

    SHA256

    6b88c6ac55bbd6fea0ebe5a760d1ad2cfce251c59d0151a1400701cb927e36ea

    SHA512

    cb5ad678b0ef642bf492f32079fe77e8be20c02de267f04b545df346b25f3e4eb98bb568c4c2c483bb88f7d1826863cb515b570d620766e52476c8ee2931ea94

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\69C6F6EC64E114822DF688DC12CDD86C

    Filesize

    779B

    MD5

    cc4a1c70f16afdc865cffc67caede5a1

    SHA1

    5b3a39e3bf12a516bee4aba19936d11998702265

    SHA256

    69227d14d500f270b8662234349d38ac2639fa6cc656cc687797d7df0a747333

    SHA512

    b8e07208b1f8db5a0935120d1f6d76136d03617e3a717395f83b041da2f007f550547e12ee74704199b0bdf0ba1257c0bfb06f5865c17a65388416d1fbeaa580

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157

    Filesize

    340B

    MD5

    4e8df64b34114b5319c172c3132b7e77

    SHA1

    712a199f0d13bbeafd90ae8dda037760367f5a65

    SHA256

    16754de78803f79700fb14678fd74bd72ddb41cb91d4f9d803dbb69dac7108d6

    SHA512

    2d196cf4fa7f8f2c62ead4a612c3b67059efa0b2035308c3e8d9a61da76bd47810c0288f0fe0bf7c843acec41bfc2fc78cc1db10f20d82d16dabbe4dab926d04

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\69C6F6EC64E114822DF688DC12CDD86C

    Filesize

    246B

    MD5

    3ee851eab3d64ccfe3dcc48ac3c9b795

    SHA1

    a91ec223a65f184ef499f00a23e715b83509e26e

    SHA256

    56427c8e2562a4cab473da81fd461c2941ea90d7cf28cfef44e024ae24758f45

    SHA512

    75ccd0f6a9e40e0bb1a2569652c6ea81ed6ec4092512630cccc14ca235c2f7d5d89a1a3bf19936a936fbf7bb8d31739861421800fd3f535a2594bf5ad6dab4ee