Analysis

  • max time kernel
    1542s
  • max time network
    1507s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/02/2023, 02:40

General

  • Target

    NO ABRIR/Factura-8118980.pdf.html

  • Size

    401KB

  • MD5

    dd262a39abbd4398d449098834772d81

  • SHA1

    eb9c36217c09501bf3f665eac04ab48c47f6556b

  • SHA256

    0de177cd155ff3926f64c424f027cab06d7a7e52f56e3129c349ea5e1229d17e

  • SHA512

    5163d8068befcfd202944d98b4a6c8ba1712b00c00e2a735a810cd6eea132ba5aef23c36600b214b0b0bbf869da6b26496fe55ed64ceb7d3fe1b52f3c9b1e979

  • SSDEEP

    12288:GK0BOU3+06BkHl81fs2mxOa4njhiYRxz1z0:rUu0OkeVRVa4F1R/w

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 37 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" "C:\Users\Admin\AppData\Local\Temp\NO ABRIR\Factura-8118980.pdf.html"
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3040
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3040 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:4228

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    627082c64c12e33958757c71e493e289

    SHA1

    76523ca1f952da5ca306f72c6efd497fe90085cf

    SHA256

    4939d97986cdabd824b38fc8ce3d4b8b6ebeafb7a113d2af94944b09e33454c8

    SHA512

    2cb4f47a38d99edfc1c25e520970fb057acdf589da1d097d0a621f020cdb843e8c3fe559d1098b04161f22d0596ccaf34d526b4ead38e5bb94421a5b209daeb6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    404B

    MD5

    417a7b9ef20ea70dd879070edff484b3

    SHA1

    35fdff6f9f6b95b982fe733400731b1a32e06bcd

    SHA256

    3eab95384806b45867bd87ad7e5840bf9f66a75d26a6f26570be34f6e3e87f0c

    SHA512

    a1293c9f72e848a56ad62a6671a3144a7109da401a72b816f3d43f17981de06660a512f250a242a065ea934791b3b6d1c340d328a290ff9ec7f639ab0d7e1477

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\ckj4gk4\imagestore.dat

    Filesize

    5KB

    MD5

    f81277bd108079bf2a45659bf156ee37

    SHA1

    2b8b55a62e5e50a99b883c4515bdbea229ca0b81

    SHA256

    df44858f4011ff2fd4db01ecb0777471fac2c0c24fe460df2788defca4625b15

    SHA512

    2d1d7fa34c0df81b3277d90212c448715cf63f17b7b8d9beb8d49629f3f6843bd03727b82dbbff4553b1518322eedbce7231a2889baa404d38f96e070a140d99