Analysis

  • max time kernel
    148s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-12-2022 09:31

General

  • Target

    c02b1bcac35bc0818bfaed59bd1c4691c4cc9aac43fa97172e63b08b4cb7ab29.html

  • Size

    10KB

  • MD5

    499f018daffc5d6a3e415d1eddfd0ac1

  • SHA1

    8e98c896a4b41ca5858d91a33b43a0214c290cec

  • SHA256

    c02b1bcac35bc0818bfaed59bd1c4691c4cc9aac43fa97172e63b08b4cb7ab29

  • SHA512

    7cc54df826e7c7fdbdb96881a74e351e918deaac96feb883af7b1c95fccd5cb7f4921bfff7f2f6bb269d81d3aa5b5da957dc669ab106a4816bed20d7f756c5e1

  • SSDEEP

    192:hh9999999999999999999999999999999999999999999999999999999999999t:hh99999999999999999999999999999t

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c02b1bcac35bc0818bfaed59bd1c4691c4cc9aac43fa97172e63b08b4cb7ab29.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4976
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4976 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:3272

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    ac572cbbc82d6d652cdbe2596aeac4ee

    SHA1

    a631b27cf33fe134f42ed411d7ea06c21df41ad5

    SHA256

    50b6d8f62150a7bd25fb3e462130e8e054a0f1fb619487e8c426a4c8bf6bdca8

    SHA512

    070095ec83e4eeccae5dcbadcb3132f08fd0aac50badbc42cb72691236b6cfcdf14ce275fb1bf5511896bb4dd25c2121e044341003c1a507be8fabc0b2b1bfff

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    434B

    MD5

    b7227ad87c9706136a659bf67a19307d

    SHA1

    859bf2f87e7aa69764dcc8fc0c89f58707f29547

    SHA256

    333f4d49a4664f3361dffa2d2e766ff5cd8331bc1b2c9eeecbe3a9e5e7e50089

    SHA512

    c168c2da1b8038c17d00e4e19d7cd519bb1e5bd4cf7275c46640019ef475f18bb991741dc159a5656c9ba57a73ce870243203529748b58f51740c89040bc1643