Analysis

  • max time kernel
    101s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-02-2023 01:17

General

  • Target

    Play_Now ⏮️ ▶️ ⏭️_20222322.html

  • Size

    868KB

  • MD5

    717e4fa34e5c48cab6f6bf34e440c324

  • SHA1

    806087f396e4e549c3a54f24cac27d2187e25ae9

  • SHA256

    edbc4dd68d2cf7c6e4b1340afac67439748ea65542a052a51eb3b3605dbb25d3

  • SHA512

    cf4c8be672e2b04ab7040f3c51ef3ef5fac852abc1091c82242503d413cf9620e31aa9f6d738659c586d80cc435e24ea4d44fbf57b72b845d657d00e6c282bed

  • SSDEEP

    1536:dLLU+uou0INgSqHM/0N1vh6jz33z2fxJyhAyrpiQv4zsOOh3VzPSkPDAD05kIUNE:g4By13vs5OVyHmJV6mH78JV6ndGO

Score
5/10

Malware Config

Signatures

  • Detected potential entity reuse from brand microsoft.
  • Modifies Internet Explorer settings 1 TTPs 41 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" "C:\Users\Admin\AppData\Local\Temp\Play_Now ⏮️ ▶️ ⏭️_20222322.html"
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4460
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4460 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:4908

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    Filesize

    471B

    MD5

    627082c64c12e33958757c71e493e289

    SHA1

    76523ca1f952da5ca306f72c6efd497fe90085cf

    SHA256

    4939d97986cdabd824b38fc8ce3d4b8b6ebeafb7a113d2af94944b09e33454c8

    SHA512

    2cb4f47a38d99edfc1c25e520970fb057acdf589da1d097d0a621f020cdb843e8c3fe559d1098b04161f22d0596ccaf34d526b4ead38e5bb94421a5b209daeb6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\82CB34DD3343FE727DF8890D352E0D8F
    Filesize

    7KB

    MD5

    2968bcd90aad32d12807327e658ee03e

    SHA1

    3c8f0451b90f22796b9d751cb12ab79b841d07d2

    SHA256

    c80150fe8977ac2587cbbdb4156835a2d3b57e87f6d40966659f785f16abd64f

    SHA512

    58d00c85e796bace1c47c86df71e589972583a14a4749a8195341aca7cc560a74abafd7246fb754c4c885a5a7c8509dd53c36a5a3f23f346621bbc11f08cd66e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    Filesize

    404B

    MD5

    f5ba239c5bba16087289c43428a65f67

    SHA1

    a39d348840a001a27a8f7f241854bcd3eed00677

    SHA256

    b48171d5ba0dfedbc45302594bd9b1bb960a91dbe6fdf8394a41736b36fb9fcf

    SHA512

    816839bf91303ecc7dec4732fa46821be4a0b5e918d7df17eacb23922472a2fe23ce19955fa3eb69f8786ad344eaca5238d3c331ced9035fe8526ff48711d951

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\82CB34DD3343FE727DF8890D352E0D8F
    Filesize

    232B

    MD5

    62226b96e54995bf6e37dda0d2a4cfa6

    SHA1

    55b7e56c2a73cca8ebbce72f8562586f0356b12e

    SHA256

    c7ef31084012c121558168d026aad8d9472cf0eb75297d349695d666032e7685

    SHA512

    eeebda9f921728cbb9208395943c56e1e569416fdef967703b8dc2804cd35b91a56502fe7b923992ae6487cbc267556334776c1e18674a5a87f0514d102ec793