Analysis

  • max time kernel
    73s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-02-2023 05:01

General

  • Target

    =?UTF-8?B?SW52K0JsLnNodG0=?=.html

  • Size

    3KB

  • MD5

    02ebb0c7f4c8b80f3c1930a6bff451bd

  • SHA1

    faf50e8022de2316ef4b223fe7d458005a850674

  • SHA256

    aa06709068d24029bfc846262ba41e34778047a57db674dfea46185e2b5ae5c8

  • SHA512

    09012f02804677a33532983acd84f45ee1c3e7dfd640e091368c9907ae321e8c1f661db65f7a2c761b26c8d4f85bf210b7642bc9ba7c170c016b342a3f6857a5

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 41 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\=_UTF-8_B_SW52K0JsLnNodG0=_=.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3616
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3616 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:4880

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    b361a12d0722996eedeafff6f3ab3ea0

    SHA1

    91930bffa495d1e86439145351811adfd5a03bab

    SHA256

    8e32031a383bcb05030de62028384fe72b699bfad83b040de9698305d29494d2

    SHA512

    fa426d3bd2263009b9e95e1812773cab7d1daba5e0a8ebb9b66829df1a0eaa48d9c4d7a8d9a4afd4d62a143ea60375cfa3ced2682d5d1306d2ba3a878cf29d1f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    404B

    MD5

    be7a70d1a367a25baa26e4cc8ed9db6a

    SHA1

    44f55ece34916e75c85ea1e9c0c658b245506701

    SHA256

    2e894caef4328cf652251b38936cb1ddd13b3abeb3dbe70ce468e7cf6c198130

    SHA512

    51294dcefad6c49630453411f9607b6eba22a632dba5bdf95284817e91fd02e30ea7de8ca0b37391ebffd85bb72bc62739595318bfeaf6522297a5c373efcdc2