Analysis

  • max time kernel
    91s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/01/2023, 01:18

General

  • Target

    e2126cef1b600f75c627106409c21b5ea17994e1.html

  • Size

    59KB

  • MD5

    14c65ec25feefd59f2124ccd03942cac

  • SHA1

    e2126cef1b600f75c627106409c21b5ea17994e1

  • SHA256

    5dc85e2d28a751b14f5948a3195e08bfb20d085dc919ba1313cf1843d1a3bc6d

  • SHA512

    d8d34cee6638c61f70c87a0a10d196880f40d507ab93525101cf29e776144d069055627086a11635df03506fb97b6852d3cc5d3c03c93c3c3115a350b7b26ffb

  • SSDEEP

    1536:orFidrex5AOYDm5IWipMvjx1GzYyUM7+4/:0+Mvj3O

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 41 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e2126cef1b600f75c627106409c21b5ea17994e1.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:5056
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5056 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:4076

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    99446fc0c7f7d4b12e462a96d9aaf7dd

    SHA1

    84c6f8ae5ee2370c549af11c93fdd27fd0edfcc5

    SHA256

    37f9bfa1c3e5af64ecd96ec2b31665edd3d62211123153fbe4d3339ff0556f8a

    SHA512

    fdabad9e26ee09498e38711e3466c5a5535a75d1525f2764bdd587742407e5e596767195089a3f6aafd49ec001d9137b571372daba0c0cec1149d42ef6f0f64b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    404B

    MD5

    1f6c2e494fdd0e6668bea4c8b7800b3c

    SHA1

    657e49f056e025b24fcd0099fde7443b87384249

    SHA256

    91cd3c6ad0355b820433059e1467e197a31b39dffa9843bd6ee789223391c7ce

    SHA512

    0b5104b7e239dcc0c7ee17c1780d0527432e53d61acc48f02f412a20c475925b0799e9d0968343be1d67662604e6dbd9f18988e893e11349bb103e7e1bba753f