Analysis

  • max time kernel
    106s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/03/2023, 19:30

General

  • Target

    adjuntos_marzo_21_03.html

  • Size

    102B

  • MD5

    7ff56dc0c0908e082c9464e76c61a01c

  • SHA1

    d4466c8c674b74d17ed0cdaa12629f09ac682e36

  • SHA256

    0d40b6b0f22786407bef3ff7a1aaae9715e98a42839e9eb3aadbd0d0752dd968

  • SHA512

    4d25cb9bc0e64c60c18eb40cbcaf0d6a4c27ec744f11fb34da23aedacb61519e19133406e689e8fac5403c50370a8f75e6de3925117eebbf69bab651c31880ff

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\adjuntos_marzo_21_03.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4976
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4976 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:3240

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

          Filesize

          471B

          MD5

          d1c2394de328e8fdd746f216fd625c7c

          SHA1

          96e662fd61c6829b5df3c952d0f2606019351b90

          SHA256

          b7120a9fe17c0dd07d7dcf3abcfbb8575d8eefa072b580a9276bc187fa5b9050

          SHA512

          ac10db7cf61cf8ce9012cc8dc837288208be2f481f737db984d5afe1488717f46140d0cafaf30254ca5a8600716a1620ebf278dacdab629148cbfb9f4731cbd9

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

          Filesize

          434B

          MD5

          adc394cee9c996eb98f4998d3cd9ce77

          SHA1

          03029c846ad9991e926a04029425211013ca173d

          SHA256

          d075fae104b490596539a6d224784a0cc1b5fe972143dd2b54230346e4edfa7c

          SHA512

          65598840161560e82f7c02f18c61a6661fd8ea713cdc146cbb7105149f384329d3299840cc32e305a048ced9e2bde462749dc42dc10e6dbf1515da2169585267

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\U4IULL1L\suggestions[1].en-US

          Filesize

          17KB

          MD5

          5a34cb996293fde2cb7a4ac89587393a

          SHA1

          3c96c993500690d1a77873cd62bc639b3a10653f

          SHA256

          c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

          SHA512

          e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee