Analysis

  • max time kernel
    148s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-01-2023 15:50

General

  • Target

    download.html

  • Size

    101KB

  • MD5

    d6123c8158dfc098f503aa18f2cc003b

  • SHA1

    fb96e7bd08227edb18ae3da6327793dd065357f8

  • SHA256

    2954db223e5d548b396a878d22e0abce9914ca46358a96e9b4c546438eecd76f

  • SHA512

    48e1715acfe8884213c33fcad898661c9f0abc5c334fcf4b99e496864a156c406fb400feec13f20c7aeedd05a48d8f762c173ebaa7e9a67eb3412e059dc7105a

  • SSDEEP

    1536:sYjUMg4/Xu7/Leh4U2gdU2gFDVeagbXaAlpm+MiMYNrFKBOOP:st7/LehqDVeRVvmxiMYNry

Score
3/10

Malware Config

Signatures

  • Program crash 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 41 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\download.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3416
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3416 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:4884
  • C:\Windows\system32\WerFault.exe
    C:\Windows\system32\WerFault.exe -pss -s 448 -p 2280 -ip 2280
    1⤵
      PID:3556
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -u -p 2280 -s 1752
      1⤵
      • Program crash
      PID:4704

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

      Filesize

      471B

      MD5

      8a5b0501264723fde62a18fa0bf6a688

      SHA1

      c3c373e0ead8d536441ebf7253f28a661d5c05db

      SHA256

      27ab0d5e9d621ade60cf8b9d0f8c6561f7ecbe930cf914236b9e702b51899858

      SHA512

      f563082714ad9a698f4c9602c691baf760684cfc4071b6fe93d5d57c6dc086a23b6d1f8ebbfbf99b99b5f7487b80a48b29688b7a735efe82765b16ceb5a1e6cd

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

      Filesize

      404B

      MD5

      73627c2eaad375873a669d258b8d403a

      SHA1

      df23f8ff66d059e6baffb22da073ad652f00e8f3

      SHA256

      0d7a865b3e97287394538a307e402da67c66a6df8a38f464f93db2e298230f69

      SHA512

      2e902a36a2a2dedcbde5d39afdcb571b5f94f01132e35898fc9927a12bf36e19d77a8e31bec841320a132c7a577b1acc64fc6ce1ade40341d4701e4a35e7dc67