Analysis

  • max time kernel
    145s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-12-2022 08:33

General

  • Target

    var/www/html/tata-pravesh/public/images/login/__MACOSX/www.scarlet.be/_css/._myscarletMob.html

  • Size

    268B

  • MD5

    4b74ae26794fb01895816b92c953567c

  • SHA1

    53fa5eed11be101ca99a131a79800b315b30ab50

  • SHA256

    d40b707f2114ce0f11a0ca4f233aa3774df4ddeb41bd580fb7121f65bcfde536

  • SHA512

    267691ba4ad834507fadeaea845434f63e552b8d14f82c166228e02b6f67b503515eddedbc6ceef9518011145c9c7c095336715aaff3f6e2c8ea603176140fd3

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\var\www\html\tata-pravesh\public\images\login\__MACOSX\www.scarlet.be\_css\._myscarletMob.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4208
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4208 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1792

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    Filesize

    471B

    MD5

    35b6b5a1266ffd7f45cb92dc368b2f1f

    SHA1

    8c6a245e00c2f517086b7db9a2c24e876cc79f85

    SHA256

    94904b4d34cd577e29be5042bb21d65e685047f3591f3051c2c9850681d53ccc

    SHA512

    bce75bc358fb0bcfba3c071e86634dfefbfbcd9c3cb1057d4e4693b0b19318ca0ec837e8a2d7ec9308042a71f49650cec395bc6a054d12e7da7564af2fccbbae

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    Filesize

    434B

    MD5

    bee74da3adc9f2e22a9c6e6982f16e5b

    SHA1

    206909394fc6d4fb4ba3f2478feae1417af29126

    SHA256

    ce85e3ca05e7b255f22239dac591334fd636bca38980501c487d11d089c448eb

    SHA512

    8653b1fe4b53789df92309465501a3d329240aeba1ce8d65c29456552dc54a15f1e4fe4bdacad4dad3235a7b836f91cc4ad544a204e82a3e4454aad018efe31a