Resubmissions

19-12-2022 02:18

221219-crjw6aea93 10

19-12-2022 00:57

221219-bazqlsha3w 1

Analysis

  • max time kernel
    90s
  • max time network
    142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-12-2022 00:57

General

  • Target

    09b0fbeb-d458-4be2-a28d-f0c04e6dc12b.html

  • Size

    311KB

  • MD5

    0a42c0ac8ccaa95f63bc9b5d6ad0fb25

  • SHA1

    f0e17f7a460d02d8e26896514a93bdb534acca5f

  • SHA256

    702298b3f055f255f733cf92001e0223350b2dc63f276d53bc566a2074ab215c

  • SHA512

    8e186e790749cc6c8246b0d83dd8fa68f53643edf0e37b649431f0e3b7b0e4fcf34ed2c1e66e1d9f8c69e41900ff34e2cde7256b0ed7ffe760e456f9544a84b3

  • SSDEEP

    6144:RPXxPknMr0+J5LqWOv2BWTa2Xlx2HSem3N/DkSf3Yx1VJSxt+ooYuR7h:RPBuD+Hq3vyWO21eoAK3Yx3JSxcYe

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\09b0fbeb-d458-4be2-a28d-f0c04e6dc12b.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1060
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1060 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1056

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    Filesize

    471B

    MD5

    fb4fd6eb88e9ccaa7ac2f01f20f2e92b

    SHA1

    f815f8837219c62fdc707060ff5db59026f321dd

    SHA256

    4661da0b257116dbb70c1b901004e85312b78102c65be48adf48183e8bdbf3bf

    SHA512

    58b377cc3d7362d07d1d4d8fa344e766d55c72d91f0510d423b36a709760107352659782d65c3419b2ddda2af629da6085d36c1f44e721ae3189ac1f27476c83

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    Filesize

    434B

    MD5

    b1f0d57073e8d560521144bd7aa3ae5e

    SHA1

    f890e413a56b78f80815cc27cbe143e701bd1584

    SHA256

    d48ae6e2d4c39203a1b17e29e64eaad6fa744c1cf4811205fa41d890189916cb

    SHA512

    39dacd3a250aa8d9414109dc3ff8f06c85d2d8d4264c4084d76582570be93f77dd9bc6546be9de48ea415b829acf5a055ee6834315920f3d84b8cc094b136044