Analysis

  • max time kernel
    106s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-03-2023 05:15

General

  • Target

    email-html-1.html

  • Size

    464B

  • MD5

    8a31892e98b300cee0769ad98c37103e

  • SHA1

    b759b2c575e43e4ca9ba992cc6a5d98fed618276

  • SHA256

    1c6072ed4159e523f44ab7192ff79b6ff43f3cee987374be128613f0a0132a34

  • SHA512

    2d4684acafab479c39b7414b28e3fbcc7c4220f5c939ad400254cb75e8b5f36612dbbb972ab16ef460154c53aac5c745e10b785f59eb07ea42aeab352356b84c

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\email-html-1.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4296
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4296 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1052

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    Filesize

    471B

    MD5

    c66cfa49f6cadadf1e4c32bc41cd8a8d

    SHA1

    facf5beec3d61902fcef4fd6b480c9d5c9ad4f70

    SHA256

    2c353825e60adc95b1ff3285367a587866a49f725e9a1c27eccdb547ccb51ea0

    SHA512

    113d06705ed15ea79c868b06dbb50b23171365a18c0953076a8f962a49df6a0bc6d1a02d73fc6b53d540982a352eea702b553769c27947a42842d67cb766bc12

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    Filesize

    404B

    MD5

    bc23cb1c95cfecc3e0997c444273a397

    SHA1

    5dcb9ddd45d76ef4c4f1777b400a80d3e5f6f98a

    SHA256

    0b40a99887b75ea8c45689657ba1d0956bfbb93efa57ae0603de4c7061d14064

    SHA512

    e5b803bb77285b2a5b6a8c24a3fb0a1197d51206965e3a56266068cf9aac7ad2b886490e6098a9e91bb58ce5f617853b0bafc5313b1d65d1018f6293b455404a

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\4VT6R2QM\suggestions[1].en-US
    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee