Analysis

  • max time kernel
    135s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-05-2023 01:14

General

  • Target

    ?429696.html

  • Size

    235B

  • MD5

    a14f16e348e0cd07888948c231692536

  • SHA1

    3fa452c8a548caa234ecfcf2a413e2ec77b60c53

  • SHA256

    c7b24d58e4e305537f3da293f6ffe6995fb55ccc12f2439663b75367a594021d

  • SHA512

    19968b89b55087791969d53535efd276dfcdac86be5eea2fe846d737856329f0e8841f1aa19639fe2668afe58d738dd32288e4e6ffbf28cda7b452d92d7cd94a

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\_429696.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3508
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3508 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:4156

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    931ac31f82e01c4a5ed27d29ed4ac208

    SHA1

    3c0e857f02516e94d3086ec277790e5c2c4bebf4

    SHA256

    25f80b41222c619107eebc45f57f927f46cdd4fc8370183857e6893015437a60

    SHA512

    a21065c11a9054ae76793859dad589aff47cb98ed0557bdb334ef1c216038635c3b5841406a21969af77775334e316989f29195beb415f7fdd409f53b6589ec9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    404B

    MD5

    9aeae5c40b1806adc66bcb7a081c9e04

    SHA1

    164e7f6e7bf4a262566f43a647bd40c8fd848ac6

    SHA256

    1a4426f62daff4cfba3c5838d8820e58a09e5a004de72260b6d899597233636a

    SHA512

    7b949bd0d6d6c934a9c379d84734d32024493223d88e8b414c115de8c2581dd367d4b5b6339cd8792a264702668df6d94fce881b4ad67ee4267b26720fc25acc

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\0BMP3ERH\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee