Analysis

  • max time kernel
    135s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-05-2023 15:40

General

  • Target

    schedule.htm

  • Size

    12KB

  • MD5

    6cfaa4d099fb1a67389e3d9c0c5974fb

  • SHA1

    055d3b05068cb224adcd91b1226be9fd62de4f18

  • SHA256

    a01dc7516b1cc2ff22787da73defa68feb66c65ef980f9482b5712fa320220bb

  • SHA512

    5975a85171c3583929cd08105e967695492c35ff319018f218c61df73e6347c2aadd3e4ccf44e5ebff7615ecc62ae8bc340393f61bb86f306eabcf119b80e389

  • SSDEEP

    192:VNXKpnpCO3w3LWRDjeUtgyo3azy33eDy33Rn4CXy33UMhHWy33ZqHyw3oBy33SJp:XaJ3w37n4ce/Qw23Y

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\schedule.htm
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4552
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4552 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:388

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    b30b965f8f4a498d342531da5dcb2edc

    SHA1

    eaa1a26275ba01f4166e94673cec8aa7b71a6bfb

    SHA256

    72e74e942c74d42e97b7143298a9c6010be5ed037f3a45d139b55e5a5c56afb1

    SHA512

    e87cae5d5dc9d7083b69e2fd71325f0a7a035c31279630483a5914be245306cc551b0eba3a73521c1004684eb7012f59de1f085a39b900499676bae02ba39de4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    434B

    MD5

    3efd0d8880ecc8c34ee69181fb6377fe

    SHA1

    6840a3d62f9ade677c681258bed77c0589063c7f

    SHA256

    9d2db1c19a164bebc0bcef795c0fb6f92b190617e24a7b323a3d150e26fee64a

    SHA512

    d7727d40d33cb3cdd1ccb86dc2b9f7e7bb9503be39718575196e983dd2b86d4342971ef641fec20ba4d1a8f5d2814ed015b8dfd724515f645162578821eb5367

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\YYL8D8JJ\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee