Analysis

  • max time kernel
    95s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-04-2023 17:01

General

  • Target

    EDD_CA_Form _02701220.html

  • Size

    43KB

  • MD5

    4313657954a8ea67e7623ee326f4c380

  • SHA1

    e64b29dcce144168037a5dc110d3ecc4f24d7273

  • SHA256

    ae73d68868298a76d8d12339a2befe7d071e4c9d46269172e12a0f54fc4f11c6

  • SHA512

    fc1235a9f3d15d44f9c50295921f84c6c816235ddf5d4da74441f03055c174d22c731876e13b9429f7df57eb4d27889298eed85faeadf5450288f8c895c771be

  • SSDEEP

    768:UVfBXqLio/9omkwkSJ6q1J6s7xfpUalrjBr:UVfRq7/9omkwkSJ6q1J6s7xfpUalrjBr

Score
6/10

Malware Config

Signatures

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" "C:\Users\Admin\AppData\Local\Temp\EDD_CA_Form _02701220.html"
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:5012
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5012 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2300

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    8b82e64a7691fb70aec48c12c37eb312

    SHA1

    96084b73e24ced2adea93695f71a62092771ce79

    SHA256

    5e1b36f0cccb94221d862d2fe35c892d699d397a87f74f18a668a57ba7ef8d5e

    SHA512

    36802e6043f76d717a376d762f84e89be4bf5b6675bcc662f9f768dfe6487582654333ede1f871cadaa5b5120ad5147ca81bd79b5092623d38f1fbf4037237f8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157

    Filesize

    340B

    MD5

    2a5b4f7f6a8c50df5049363e9aedc82b

    SHA1

    6744e0d6876cbb88f22fe90dcce3ccf11d3da00f

    SHA256

    50fc489d506b62eda4ff459b30774fdc5872d3c85cee8176ec4a3f3b3bd1b2aa

    SHA512

    a459c0eda1d0dbfac7612fd2ca1f78ad7521d2bc33f44c33c8a012bd393ed79ee3602823d5df03a3d83e1d2d868f24c7d93215681bc2410253b99aa4ac565d99

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    434B

    MD5

    59d57d80229f1fa3d1d4cdeea9752f71

    SHA1

    e7a08577468c1b24d73e8f8f5ed7a175adef43b4

    SHA256

    b4a792a1f65ebcefccd72f8fdea9908a91ded72bae4d58ce1cc85797d08a502c

    SHA512

    7c777cfcf354934da4b9fb539b98a45c8702daf6ec767eef31469cc71743878956a20eb89f2fa71cf643b0c452ec23faa88c9a452075bfc5d0cfaff1f2b0ba12

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\DKFP9JBL\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee