Analysis

  • max time kernel
    73s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-02-2023 12:31

General

  • Target

    📷Re.html

  • Size

    209B

  • MD5

    dbb63ce515b81fba9596015c9cc83f29

  • SHA1

    62c028c1e748a1105c750a7164f406aba174f2b1

  • SHA256

    5ef2041442d2f0ae196f3526bd1ff2e2a5a77de2c4bce5db157dc088512281e6

  • SHA512

    5a72f47b555a53f993d66d1e1c1386ad9efcdff14350b80fa3ef14a5f4412fa4aa8244373bd72ed77bdb8e42b2cde5f42505f66865eafbd4cf50ab46c97f5840

Score
5/10

Malware Config

Signatures

  • Detected potential entity reuse from brand microsoft.
  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\📷Re.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4824
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4824 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:3740

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    Filesize

    471B

    MD5

    f60b261fa864803670980251960b8d45

    SHA1

    0423aa6407d944a6f826e8ff197014a75114572b

    SHA256

    e55b79fb46ab833b600da6bcc39eedf6650e6dc890485c85e41e14d11ccd0055

    SHA512

    2e8ba8c5e37d8fa0d26237bac4c47928a28762959bb2873269721c7d9be7b66b10e6d058d9c855486948ee8eb591e5fd3a57fb091e44e4ad16436af74b4da357

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    Filesize

    434B

    MD5

    0734ca852a5b1a094ef563a7a2a4d9ce

    SHA1

    b786677c66d49db02048e7d80f9580330454f961

    SHA256

    f8c637818170089ab3831395b07640d9cbce3245bdf6b71e44346f2748081035

    SHA512

    f16b02e9a648bbb45cbd7568355235cb85032a261cdc5d45b2b44e47e3647a0ed0c23bbb64c0d7ef1b17e1304189c44c8b303865d17e208c5d590a3dfacb6ea1