Analysis

  • max time kernel
    83s
  • max time network
    140s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-02-2023 08:30

General

  • Target

    Payment_adv.html

  • Size

    2KB

  • MD5

    ea3fb9e1983a82147195b079888597b8

  • SHA1

    bf853613d7348fd1759e307e7fe9307c2d837a97

  • SHA256

    579eb960931a5a9f12be73b35a55cd59c524fa03c24436fc4b2686f7901ad288

  • SHA512

    5a6d700afcca35820d7ae99714087490842f5364ecbe8be24f83f1effab12e28672666836dc5faa82b5c8987492e2f747fb926fd177d9175c77335498e72c11b

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 41 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\Payment_adv.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4612
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4612 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:984

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\69C6F6EC64E114822DF688DC12CDD86C

    Filesize

    779B

    MD5

    52459475bbead1cc9bba0ff24722c884

    SHA1

    1e6cddf21f19f4819050782cd075b72fc96abd7e

    SHA256

    23866b98ab3cc0c8db11f876560468be263c7bfd29c2de29cb36e6eb68c5c67b

    SHA512

    9fd1c809e66ae2443bdc9adb6e3bcc7b50a26eb6f518d317bd1b9a152cc9164145637fc393fdd6e4473e84dce947d638127259684a49bdd33dc5458385e6dbb6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\69C6F6EC64E114822DF688DC12CDD86C

    Filesize

    246B

    MD5

    76ea8a8fb0b3c48c4abdb7856a348431

    SHA1

    c62baced9a808fcfcb98f3a928f877c4a009c411

    SHA256

    109a96d71eb3f7f379a856aae728157c1372b0fab75cff12d06dea8a0ebbb45c

    SHA512

    49a9a5a1c4823823725254557817033ba0af37fc2d7e17654488bb8a4f30694dac313729b715703aaf4548d6d33f66245a3c7a919cc363f0df786510be651c60