Analysis

  • max time kernel
    36s
  • max time network
    40s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/01/2023, 19:20

General

  • Target

    1YT-riDoKTNG2KijZH-k0QqdGwObP-22k.html

  • Size

    277KB

  • MD5

    5e76e3f18830c670bc9d6858c87d47f0

  • SHA1

    77b8aea7c93f5ad6fd3837ac931e871dd2cd7549

  • SHA256

    cd3406e6dd215a49231490a1fc97dc15d1972d0271d6becee7106691d14c64bf

  • SHA512

    15dacccad189549f7d2ba0c53c4f93acabff9346039eb642c8bd61fc24be393cccb2814e6fb20d21a9706b5d6c90e003df426b5a5383aec35c5902ce80fd4913

  • SSDEEP

    3072:usKnWFDnDBZFrYaA3E2d1GvhLBdna5c5m5f5ZL58nusq3MHDXvDhWpT0fT:QW3ZqaARGZBUGktrLynusq3MhIoT

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 25 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1YT-riDoKTNG2KijZH-k0QqdGwObP-22k.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4856
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4856 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1620

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    03c43ce055f8989a6508481c8acb6608

    SHA1

    3dc33276158435396c4272531a62707a18a4a875

    SHA256

    1e977bad400e43c86966889b895bbf3b00b929b4bf497c791ad0ed2a0749fd3e

    SHA512

    fb69a674b2c2aa697a7c1fc94490298949831762d9d9612266314727ea85f84035df089f62e1aec24474caa1fc52fc94ea704d161335d37c1cf746c72af1f8ab

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    434B

    MD5

    0270e445e38f8f8118def90413ffb340

    SHA1

    c771fa39f6429922905b82bf90fe06a68cdbb2b9

    SHA256

    b76dc0a07575499ae78ceb4b333ccd93979c44479e8f6dcfe4499c5888b5917d

    SHA512

    534e157dcccfa20372ad5849e7bc0fcbd97ef03f1638d66ef5ff14c6ba3ac8fe87ddfb3120b6850b28e8ba75f301c5b691e49e030f186cb0c9c329c06bb74b6b