Analysis

  • max time kernel
    135s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/05/2023, 02:02

General

  • Target

    FEB1479F44036D249D1B6F4EAF1C9B633CDF232D1AB97E64A8D24C59B4879582.html

  • Size

    6KB

  • MD5

    047719a1e4745e59eaec6dded3fd7831

  • SHA1

    9f3361c5a16002cb9ea70d41a5619c948dfba115

  • SHA256

    feb1479f44036d249d1b6f4eaf1c9b633cdf232d1ab97e64a8d24c59b4879582

  • SHA512

    f531b9ceb4abf27a3cdfddd3c0f680d1a23deabf8aac9f980d76057b6457f8062df3ac3044943908dc03920813d0eee8ad9ed7b9aa7e540364bb563d87d638c0

  • SSDEEP

    192:u2SpOX5oEaxqYNd7oZjid7lw5oEaxqYNdUdhUmw5oEaxqYNd1idy7P51qaHKGBuD:u4a8YfMZ4sa8YfShWa8YfSy2afBu1wIt

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\FEB1479F44036D249D1B6F4EAF1C9B633CDF232D1AB97E64A8D24C59B4879582.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4052
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4052 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2412

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

          Filesize

          471B

          MD5

          07016cdc594feecfe290545becbfb4aa

          SHA1

          24444840f000be99fd72c1ba38a562438ef40ce2

          SHA256

          d04b8eba1bb5f80734384331bf9591e1348bbc07256b2cdaaced7398a5632202

          SHA512

          98fe1e1eeeb54bf7467f51b09b2913ced06fba7838e6b362b2538937a328c7321d6bf564696a39facfb0885fcb9317ed1e81b49d769096a3f3d4343b2a60e9d5

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

          Filesize

          404B

          MD5

          5e4e63418e68b17f8223e4222bc7eb5c

          SHA1

          a7d87ab172cd53bc3b67db829f3f7dfcd7e416ec

          SHA256

          7ad88029570079bbe6e9a8eddff0bd6b2e87a2a0a797ca4b8bb82b3eafe2f0b5

          SHA512

          6c78708793da7940f0a079a9779402a4a52414cf8e5cb129091a90dc88f61b8bb01a7cf910f6b9b76807509c9eebc52022ac95b34bf146e2b6e141fe38e01cb0

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\39K1WZBJ\suggestions[1].en-US

          Filesize

          17KB

          MD5

          5a34cb996293fde2cb7a4ac89587393a

          SHA1

          3c96c993500690d1a77873cd62bc639b3a10653f

          SHA256

          c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

          SHA512

          e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee