Resubmissions

07/02/2023, 07:12

230207-h1ypkaaa39 6

07/02/2023, 06:47

230207-hkmx5ada5t 3

Analysis

  • max time kernel
    91s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/02/2023, 07:12

General

  • Target

    email-html-2.html

  • Size

    1KB

  • MD5

    a0a927ec6c0676bc09caeef910cf8d60

  • SHA1

    d08817e9a814657c17cc46e66b6c1f8c65b1f27b

  • SHA256

    bd28187e2e8c73515a06252d6cf1f0bd0de19f03e1486f2729d179fd71a0d874

  • SHA512

    9862d3bbd481c4d9118234288581ab480fe1dbf27b367ed59ac0c2cd4927dded1a8edf822d7757bb42449b23242d8dca1b0fcf60c465b436ba87e34d3ac3ff94

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 46 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\email-html-2.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3796
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3796 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:944

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    aee722fcdc90fcfba473126bf8bed12b

    SHA1

    df62a695b671a248b19f76cd6d420d1bcee9c27d

    SHA256

    e759250bcfe36a1a745bc1cc241dea84b6c791141e93b322bd5027d62d3a4807

    SHA512

    e51c09b66f06f247289841147cc6ebf2b70308cfac2c500915ed2b4775813e48422e60779e50351ac668bab548afaccb822a1486ae8242bc37697f16f3a994cf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    434B

    MD5

    807c9a85d8db67d765a7b00a18b4df9f

    SHA1

    8ab59551f7ff2395d9dc165ade9819a7596e651e

    SHA256

    52d9e036a49e957dc975bdfb4e11e9e7457780e3034a127f1be27eb9dfdc0446

    SHA512

    67b629c2ae13cd77da03f6f21a1cc19997e03db51d123e1fe71c2a49e8d8ff4a3ece25b28307a8b8d9a01fbfca8d9b4ef1130890eba1e6815b1113458c8a2691