Analysis

  • max time kernel
    74s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/04/2023, 22:08

General

  • Target

    click.html

  • Size

    132B

  • MD5

    310e794861855f03dacd1a6bd12a5d26

  • SHA1

    7b1e76a469d9b35349c242a1c7eb5fe5e1f8aa92

  • SHA256

    6f25d08a0da028a31db3cb3fd36fc6aa36ed01bf44058520dc8689763a1b0f6a

  • SHA512

    3cee575ef31c8abe2e51ee6bd8281dd921776b89f347eda63eaa2d74803abdca6a8fc13568b6278bca0c2daac75a7a5af2e4e963a8cab9faf576afdfc66bbc67

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\click.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2196
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2196 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:4368

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    9cae92cd10c808776c6c5bdc06b1e94e

    SHA1

    41c61f2ac2d1ad4680e70a5299e5b90465edb55d

    SHA256

    39da043a7022ce176b387cac9ef8c4735eaf8c69fc0c303deaacdc232ee73181

    SHA512

    6349fa3798e5447cc38c7e35ec3d33e355112f6dd191c0d0f185ed70157323176cacd129ae06e3491f402626567746b21ea5d31eb318b565d491a5abdbb394c8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    434B

    MD5

    1a29c11c74bdaf5879995ed6e19d6615

    SHA1

    35f449756d28453a0c5ea8db71b310c64c6dd5f8

    SHA256

    79c1a7e78db2ee717890d67b864c89e11f1a17ec4fc6f66323c562fc180f14da

    SHA512

    1c85cf6f20f9b5bfb2cade98bd82b99f3402a16cea9adce2e1f43b03556341baa8292b55e564d34d56a1668295605a48702da2c4da920097b2ebfc2864ac2726

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\U4IULL1L\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee