Analysis

  • max time kernel
    83s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-02-2023 16:09

General

  • Target

    voicemail_1415277287.wavv......htm

  • Size

    441KB

  • MD5

    77711a21bbdf96895cea492ff87111d9

  • SHA1

    cfe09c030373e200ec427efd40c34d28224757c9

  • SHA256

    a04f700bff363a056db630973f6a00404a2c2e352f20d2205c5a71547ee0141c

  • SHA512

    7737c744c3b0990345a1bd85cdd5bb1e95c6e5c06e2a6f2b3584489cbd055e1d4d2260aed321c119f0551bafcb0887a4024c835ad804e562ed1b947f412bb0ca

  • SSDEEP

    1536:IZ4Y/lZOVxBHZIc3J01nP1ApqvlnS6lVSYhTMnj5IyGL/:IZfvOZHZIc3J01nP1EqvlnS6lVSYyGL/

Score
5/10

Malware Config

Signatures

  • Detected potential entity reuse from brand microsoft.
  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\voicemail_1415277287.wavv......htm
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4908
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4908 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:4948

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    Filesize

    471B

    MD5

    bd813f25b25946e19e7b3acf153b3674

    SHA1

    1570516b96c7931bd565ac9102e79e1664216997

    SHA256

    6c744ffa4555b4c92c632743742782df3e1b9c33004c73247574da26a759ea2c

    SHA512

    145c738a3702f08d8d307188a4422e3842bc08aced2190f74601d8398d2001cb722e3c32bb6988e35a44a456fb042e6ae833a121da092d21dc2a04683932b47b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    Filesize

    404B

    MD5

    e34d4ecc1edc317ca40b4e5ed95a1303

    SHA1

    f594a28c9aca9b8287627aa3efe0d3c7d8fc2d17

    SHA256

    f09b441de4c26a2645652760c43c43090f24803015262c2b8d2c72c98a131d81

    SHA512

    a8d99db0c4947dc876e29809d132c82cf000f1abbeeb9aeac9624e5c9615edf9d6d471943816d512d8ba4d417e56cc49969264e4e7ebca7d314be0b20815da5e