Resubmissions

05-12-2022 15:14

221205-smedwabf89 1

05-12-2022 15:10

221205-skaynsee5w 1

Analysis

  • max time kernel
    102s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-12-2022 15:14

General

  • Target

    PDF File (1) (1).html

  • Size

    22KB

  • MD5

    362c4dad867f3fdf9fe3c4808fa20215

  • SHA1

    2618e47d94b09eda56fb436f614bd74efd7aacd1

  • SHA256

    3f1779948e5d73da23837ef4f39e285b9d6bd4a029589bbf51e62557b3abd2db

  • SHA512

    b4c27f5900b0b220847ab7bf5d8f9b388fd70e6df3e38d33209f572575a2fde9621f7d377d3df26228cdaeb67464e8b37413f0bd1b906f354c942f0f427f35a9

  • SSDEEP

    384:hc0s1A4iX8i/VyvXxBmjiIOJGsfVNEtND6NSuNBto8UHAm9VN8tNPRNvtj8UQtAl:hc5ChsvXxBm3XjPeHjvDZAFGE2R7v

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 20 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" "C:\Users\Admin\AppData\Local\Temp\PDF File (1) (1).html"
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:392
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:392 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1696

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    ac572cbbc82d6d652cdbe2596aeac4ee

    SHA1

    a631b27cf33fe134f42ed411d7ea06c21df41ad5

    SHA256

    50b6d8f62150a7bd25fb3e462130e8e054a0f1fb619487e8c426a4c8bf6bdca8

    SHA512

    070095ec83e4eeccae5dcbadcb3132f08fd0aac50badbc42cb72691236b6cfcdf14ce275fb1bf5511896bb4dd25c2121e044341003c1a507be8fabc0b2b1bfff

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    434B

    MD5

    abb00e1241cbce9e6dd9331a4c369f21

    SHA1

    364efc5e6690709f053344539cb30da63bef8573

    SHA256

    7a615e2e6ad1ba41c0730106623c5b3d7ae974bddfb2adcb4b1d1a5af244b4ad

    SHA512

    791c75f00012d44e34ae5d4d76d443b65da2d12d9fa448c126dd254144d11e09b6f22443d5271309e8d146b7d1a032122c12618762b6e88e7f6ea16dbc036d8d