Analysis

  • max time kernel
    90s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-12-2022 23:03

General

  • Target

    unmarketable/awed.gif

  • Size

    28KB

  • MD5

    59a948af4a0630f230f6637a72318934

  • SHA1

    41154c5636aeab819120fa0c4095fecfbe8340f9

  • SHA256

    2ecdf5921662f523fe96ad01e35058ef2f2c2e3e4b25e725029be6f78afe1005

  • SHA512

    524c992a73256269ae81e0632d7f56db7c12fa505f13e7bd2233085896e357d40369c9e9042996ea1128715ba18b82c971530af8047e109e4e23486541abd939

  • SSDEEP

    768:xpXKilN/5DxZae4GK3hhUS+eI3TA+/Edpvd:ui1nae4hRhUS+eIcGEdb

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\unmarketable\awed.gif
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2772
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2772 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1364

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    16069a2ad2c3549056a639e9deff2965

    SHA1

    5fe45adfb5e48cbb7f5000a732d82d0143059980

    SHA256

    ae9f5edfe173eaab4629dd51d9e2d3b173ac473bb4e8ae08fd5bd2f9dd851755

    SHA512

    4f9fcab0bc1c94b0446580ac59b73b3986c7f3e16e3aa3590465b534de354273812d1e58bad032ba88d6201aa99631105ef202758ac7b662b75f2a8c415eff41

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    434B

    MD5

    df0f532b3496fe6953dfcb44d46cb7e0

    SHA1

    75762cc3558d0620948a6a60a1810b7e5d121772

    SHA256

    366cd6f3376d47f452af9db0f0bbbcbef03fc893fc76d4b81b9d886e490135a8

    SHA512

    adff1aece28f935f73002b016a5da4a9a199c2b61f9aabfa84aaab5a523e63044bca3c9def3180cf09793a1ef98b37baf4f362e5ea7acb84048b0b6823d49639