Analysis

  • max time kernel
    136s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-12-2022 08:33

General

  • Target

    var/www/html/tata-pravesh/public/images/login/www.scarlet.be/_css/nav.html

  • Size

    13KB

  • MD5

    483b47184d12b5736f75641e797d413f

  • SHA1

    286430f272013730fb977f74f556d9f6d612705c

  • SHA256

    a40568da6df8bcdd365f2619ebf39a339b85ee0574848de9f85213135fb3bfef

  • SHA512

    9b32baf82a48bd8b917efd8bd6e2eb31961f8a4e890623979fc607ab2ab3a866e0cedc1ce173be82811c8698a8c05e5175899f6b5e1177cb7487753f23cbdbbf

  • SSDEEP

    384:gh5pzzkrcrYx9FPFmA7GCe9kTuLIfRJAXzGLJYG+0/QOUktOaxRB2g:gFPAx9Fd8X4B2g

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\var\www\html\tata-pravesh\public\images\login\www.scarlet.be\_css\nav.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4644
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4644 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1620

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    Filesize

    471B

    MD5

    35b6b5a1266ffd7f45cb92dc368b2f1f

    SHA1

    8c6a245e00c2f517086b7db9a2c24e876cc79f85

    SHA256

    94904b4d34cd577e29be5042bb21d65e685047f3591f3051c2c9850681d53ccc

    SHA512

    bce75bc358fb0bcfba3c071e86634dfefbfbcd9c3cb1057d4e4693b0b19318ca0ec837e8a2d7ec9308042a71f49650cec395bc6a054d12e7da7564af2fccbbae

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    Filesize

    434B

    MD5

    8e2b2c3917c9a85400d5ff41da5ebfbf

    SHA1

    a624ee4c9aceb9833d8c7e4d2f93bb0860c14011

    SHA256

    25d8defd8c2dd550aff8fab4fbb844532e1ac36ee73cf8124d0edacf1b42d918

    SHA512

    b93363f3ea25f3b472108bef0f29122a2f005e42aa252dab4dc5ae5412550a9d08ac917be99f498ce7017de758ffd2b9a984a431edbe90f292b18e34369a93a1