Analysis

  • max time kernel
    81s
  • max time network
    103s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-05-2023 11:45

General

  • Target

    VecnaRobotics.html

  • Size

    85KB

  • MD5

    ea7526eda49b0c58bdddd3e4db38e605

  • SHA1

    e365287bf5e5b018b569ec7f88bc0e39ab4fe33a

  • SHA256

    29691a108a24b64406e93451b4d2afc3926ec9802443bbf4dad17b09bc3e5dc1

  • SHA512

    01de445952adc8f3159ab956d20733f1e147356a5cef5c19a4a7e6c03657ea614ae0767658c0aa0a959c713c7dc4281beb41998d649fd8150288d8e7d2d4fc6f

  • SSDEEP

    768:1jhkOmKrtE7LRHSKpcd3InS8CnLwjZ3DEsKmfolWXl1UzdCdAdI5bWP+mL5cr5cu:9hbt17Uy5DPNbl2LnAx2gm

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\VecnaRobotics.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1604
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1604 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2256

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    39a2b6d5caefca4fa6551e43248c2076

    SHA1

    9d79fe260d66922386720731d276d7b1027dbd33

    SHA256

    c91afdf51e6b6e391c701a4ae3fc73721c600cdd718f59df37065efff311a872

    SHA512

    0c41ca07519b5d12b20a2018ae83807f8f644446e8e8b940287532c806e9357f57d0c78187f30b07641f06d1b6b531db181e04f62bfc5cc8132c6283237588ff

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157

    Filesize

    340B

    MD5

    c5ea954db4f0a22aec8ca5d3f3dae314

    SHA1

    d94ba6ee51fe653d1cd916f07545b764931aceac

    SHA256

    8f6285312252806603216c30597ca1f6afab857848a47eb9e03341022be2c036

    SHA512

    78a5becc42c6f14ee8101c07453c209ef5b5a209418746f639d373dd945fee12d3a87432e6aba40d4565dff446bffd4c219f43f8d70d5344cebf2839f744ceb7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157

    Filesize

    340B

    MD5

    00d5fe7cf13b541d59bbb653ade899b3

    SHA1

    531f8b008a814c6b59b5549af9bc9de9f0056f4a

    SHA256

    48fa1eb462176a0873f412a4b6adb415b940f35c484834e663fd32df767fdcba

    SHA512

    938f9bba488d6050be39a306cdd1e091ab7e0ce98b8872aab7501d531390981e45e314b815c28c4f4c1fc6b238c7b21106e35d4f86022daddb77212644ce75d1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    404B

    MD5

    9fef9243d77ea2e6ec2a62761d62f5c9

    SHA1

    fb2446ec66bccba4ba6e88916fe0aaeac5975e38

    SHA256

    340524132c54dbfd8fe798214fc9a1b556d8ea09ec3c99c0e8fe32636c90dd65

    SHA512

    5e5cf304f7a2534308a93d677449dbddd4012445636f261b66cf62ba4fca4f5af6c4f0013d376b078a2772ddf3b0fac23fff635e55a451364900ced3873aacc0

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\U4IULL1L\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee