Analysis

  • max time kernel
    73s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-04-2023 19:21

General

  • Target

    mt.gov Scan_Pdf.htm

  • Size

    131KB

  • MD5

    d2f9a3cbb3db59bf203ad0f0540f7ab8

  • SHA1

    57b429d57fe497a1217757d0487c84cdaff07cde

  • SHA256

    4fa3daa33f0b90dda68018ca9b7eef67e57e24763e4c72c7a9e6db84b7d234ce

  • SHA512

    d65f44a720bbf20942954dae3e54c3f171024e91e0b60a91c0667baeb75b260cd4a3afd808c2111b82b435004e6eb53499c92f1a88ade3f9ce3f083f14a608be

  • SSDEEP

    1536:c5KvydRS9Ni1x9o9jPXhrDC7fOScXbzXsAygc:co3i1xe9XQ7fwJygc

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" "C:\Users\Admin\AppData\Local\Temp\mt.gov Scan_Pdf.htm"
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4016
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4016 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2372

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    37c79f76883dd7f46fb18326bbc6ae91

    SHA1

    e497f7d518a547dadd6b87db925199d2bc2028bb

    SHA256

    81d26deef623c5fdacc7c28350ebe71621f0625d70b54bc95775fa50c8ddb3f2

    SHA512

    1f002f0b666a353788c7dae6eea63a33191f7fceea215570b9a6d39f80784fd0f6fa64abc5e01a41a563828176d0004f0f4044f7836db7bdc1aa8972f8c7deb4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    434B

    MD5

    b52b90d1365f3ad9191115c495103cb4

    SHA1

    e8dd8b6e3892440a8256ada4f03cff554f35851e

    SHA256

    f86c1ad9781599a847e2c2f79f90b0505f9671a5ce82fec92453506f4931bd26

    SHA512

    c7f17cb6fd49436f330bcb2ea207b72299fb22faea753b384f8898c17ada5b1e927d09f0d75bf011b03e4cc35c3053c8abe5641beb641983392c3e7ed037ad7e

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\WPCK8CWE\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee