Analysis

  • max time kernel
    106s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/12/2022, 11:06

General

  • Target

    rcs-rds.ro Xerox Secure Center.html

  • Size

    471B

  • MD5

    2fa7626514e62800b5ac514cb9d1ca55

  • SHA1

    2e77bac57e297ed2c215b3ec1137dbd98c6c6b24

  • SHA256

    97af9f202f2ee7b43e3637cbb8ba7390a7658e8e125143a2056ab1a1ef1135c4

  • SHA512

    5ef300c438c94372870a5c8891b0fc457e296909cf86cbfda4053980dec602abec2cb26472144568191849658ad71cf72c1686d5117243fbb1dd2e64eb5bf5af

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" "C:\Users\Admin\AppData\Local\Temp\rcs-rds.ro Xerox Secure Center.html"
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4840
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4840 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:4064

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

          Filesize

          471B

          MD5

          d81f3875febda0bcd89884b3a7374181

          SHA1

          5b2aac021606158ee2a91b32ae012afa9124ef6b

          SHA256

          24a0648858b4c866c3dd80d7591b345abc0f61a9692dc91633121a18bc44168c

          SHA512

          3887474406ce5f39f8d73f0094c97b5152b4cf3b9ddd23898fe8e0aa9f34053ec74fe7c7e3816473b5bffded6483170bd3e247a54c3b5a701a6bca428004caa5

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

          Filesize

          434B

          MD5

          9d30bf35a0a3b26561b8e5b56ca94557

          SHA1

          2589e655eeaa383390f2c2187cf916f5a70ac0b3

          SHA256

          b5dcebfb74a0e424561a29203b640302cb1294c00dab7e5cb38d5dccaaf8da68

          SHA512

          156bc724061b648dacb2b8d63ed529309ae285ad7c2d255384cb6610d1157ba657b8bcad93b128b17cf8b9b2758f2e52c18d0a9935df1052bf9b9f21f6a7117b