Analysis

  • max time kernel
    146s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/05/2023, 11:37

General

  • Target

    welcome.html

  • Size

    72KB

  • MD5

    3388ad5394fc096ad51c209a3ad5c1e2

  • SHA1

    f429b2aabb9584555432833b156456c3625016dd

  • SHA256

    821aa06d995b554c8582ad6554863e34eaccd1adb9a1ff2ad3ff2e3f97f74d05

  • SHA512

    adc760b55d06eda20e8927e0218cabbbfcd826e9ebad4274424d2219d1ea35aa6dec034315b2d3dd7e7e34d91ed7f1715b9f11a68cae5992aa76ec7ff4a6c3e2

  • SSDEEP

    768:7uTVq9S5YbYZY2Y0YVYKYrYjYyYmYyYIYBw+9rqhAwp9pIQHYQDcthCJrX0F4FZq:CPw+9rqhAwp9pIBRCBX0mu

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\welcome.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1792
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1792 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:3280

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

          Filesize

          471B

          MD5

          39a2b6d5caefca4fa6551e43248c2076

          SHA1

          9d79fe260d66922386720731d276d7b1027dbd33

          SHA256

          c91afdf51e6b6e391c701a4ae3fc73721c600cdd718f59df37065efff311a872

          SHA512

          0c41ca07519b5d12b20a2018ae83807f8f644446e8e8b940287532c806e9357f57d0c78187f30b07641f06d1b6b531db181e04f62bfc5cc8132c6283237588ff

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

          Filesize

          404B

          MD5

          9b7094b456fdf3d45ca347696406cc22

          SHA1

          cbb1dd8435990615c862f3bcbb5d1ddd317d769a

          SHA256

          efc033105681cc70458d6d4be9238aebc83cb3e7b350c2792ecc4103dcafc0d7

          SHA512

          f85b6c6c453a0ba1d45b35b5d079e61f52731f3bfc1e93b77c9c2fc927493f2b237418784bd466216adfb83f7f446c2826a675d5c691e95621a44be526c9ee49

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E87CE99F124623F95572A696C80EFCAF_613BDE957D3B3963FB2B4F46E11452DB

          Filesize

          402B

          MD5

          518af4fbcc271cddeebe59afb846dd61

          SHA1

          4d05e7f3e2805110f91ed4c89299623cc09b796f

          SHA256

          7dd66acda76469ccf3ec365bb0cf589e6fd388c0e29d1ed21aedd2d037dd8f48

          SHA512

          cd3a02ec4e6c1bd14018ef0a7c23c5edacf897e099b05509705e01e19e9130e981488cefd13a2e44593afb5803daa3f89bba201e51cc6080376d52235876c83f

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\U4IULL1L\suggestions[1].en-US

          Filesize

          17KB

          MD5

          5a34cb996293fde2cb7a4ac89587393a

          SHA1

          3c96c993500690d1a77873cd62bc639b3a10653f

          SHA256

          c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

          SHA512

          e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee