Analysis

  • max time kernel
    123s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/02/2023, 01:32

General

  • Target

    Deuda_Factura_388090.html

  • Size

    6KB

  • MD5

    e58ce8a9c4e3747aaabed66cd4216474

  • SHA1

    dd10669e9bfc8a8d8cd13bdc26800b33135ce178

  • SHA256

    e3fc456c962dda4c3a4bd1d24dde92b3d008a92fa548ee964e16933264b3b74f

  • SHA512

    883be1f3a25676dc8be6b4ec8d8d13b6f4e519c8ced4eeaf7072237c1573b31c5b619cfcce72bdfe6c95c66b59d2ca2e18eb3e271df6617faaf07c8e6c1bca1e

  • SSDEEP

    192:e1j1AF1AQG1c1d1R1dD1c1E1Af1Ai1AK1A1AO1AQz1c1Hj1nHwE1jh161c1gDre:eFYYK7D3KmyRJablK9tH4Ke2

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 41 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\Deuda_Factura_388090.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:5056
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5056 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:4980

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    ccb3ea965204795878736144d1a57796

    SHA1

    c74c7a85503f1a1ba0c1876cdeec774aabb3910b

    SHA256

    09912639ea660c3f744c3d70ee54d0a43b591074ee0bb150e5447fd20f8a4f93

    SHA512

    16916d8458a84465e7dd6e4af1b24adcbbd3ce830766313f6963fdf7e6ed0c66b76b04636e91b68110e23604833658cc040563d46eda2bca3309fd233cbb1ac5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    404B

    MD5

    0842795cc34c4995417bb9c9df0219dd

    SHA1

    cd850a980512961a4e1c49c6488821365bc9e0cc

    SHA256

    a847df284938ad74c7443457094ab244d5eb9a7fee70f3114959f2529435ccd3

    SHA512

    61bd50e938e119b5e9e5efd66e3983e29a9ebeab973d86f93703c9ccc55fadf6f1e585a485780389a8ede92ac6e89d5a5f992c5d58a49e0b6ba74c563b3efc08