Analysis

  • max time kernel
    128s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/02/2023, 02:00

General

  • Target

    ORDER3233###.html

  • Size

    2KB

  • MD5

    cf6e8fd228f887444a2e5cb2cc20ed99

  • SHA1

    6c52409956e81b865b2bdcdaac0392971aa4335a

  • SHA256

    18b7c45cbbf3a2753b2bdd024d109c6e2963840353a520ea5b22e2b763ce014e

  • SHA512

    039456e19670bd82135fcecd0cad7d0e3f1b0cc84e78c6d634f659999d438e72e9aa3d3a4e674ff752cc51e942f395a5810d98304a7a3f6fdd7772e8c5c85c6d

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 41 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ORDER3233###.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4104
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4104 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:3372

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    415f2185a9c64b830e7558bce25207be

    SHA1

    5b9087daa5a7c1b42fa0d84b25de64ecc9ab335b

    SHA256

    9845be82fb85d04acc616713931ce35e21b76fb6bd0c76945417c9377200607b

    SHA512

    a6385a6c7a0c8eb7f4dc5dbaba72d34e921ece1bda233687a38520b10fdb1a1451339ff6a4e63e6ce3840dfeadaf01e2d95cc01554830f88811989a814ccfbac

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    404B

    MD5

    e345dde0f5422dc0c6941770d85abb63

    SHA1

    dba37e8033c53c081d5532629839e06446dd2a88

    SHA256

    99497e011c6ad64b205094252c13ac517b66afb69313dc53b4cae024c279df4e

    SHA512

    3ffcf162f38df3d020cdbe4f38baf1033480a1c41bafa51be6b937ade4fecde47c0d3b79e0826e17a722581f7b81cbb320fafa7a98ca6378e7b29c2f4c1eccd9