Analysis

  • max time kernel
    140s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-05-2023 13:35

General

  • Target

    Igeniic_Payment.html

  • Size

    205KB

  • MD5

    7610ab515098bc32588745015144bed1

  • SHA1

    97ef6e5228b1aab208646557e43960faddb74c94

  • SHA256

    917643c7a18fffe091d7d2bb1c25b916e2b854cfd1ae7f1bb0ad8d34ec2a3233

  • SHA512

    6a176107d6ed746e05a043cc24c76cdd117f332e5250b7cd7f29474902e774bdf157afd070a3654b51dace1c3aaab54da7156c12c3d4a971604d3d8aec74e632

  • SSDEEP

    3072:RQ9K9tpt1GxAcp+qIkhT5xWtWh/fewIQcQYK:RQ6v83P/QwTB

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\Igeniic_Payment.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4016
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4016 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:4148

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    94efe971fd70d9d426978045456a879d

    SHA1

    97f170ffda6afd79be0795ffcc37c7efd82ee801

    SHA256

    fcfaf64c502c0feb0175aa72247927eeecd556004302a20e09f6fdaa644504e6

    SHA512

    baf5e9e1e9bbbaef3cd6365ec2b1c71314c14d0acd5837c1975e71a374b9fe724035929b47fe5bf5aef5845ef6eb17b178f20460b115419094733dfc8a27799c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    404B

    MD5

    34a84d002ecd8ff3b4d4591db8eb5671

    SHA1

    62b47e0182e4f9022630f9c5cee5764cbd5fab9a

    SHA256

    2e3b3c94e3f5c54a3a8ab61ef76f0d1e0b5043f92777d843fb664ba0e528ed68

    SHA512

    5d5fd0c520dddf974bd7d16a36fa769b9509c74be983ed01c6c4b457ca65a74e2ed27e69cb1b944dc1260077ad146da215f293ba98df5758056bb6ea54ba8188

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\39K1WZBJ\all[1].css

    Filesize

    53KB

    MD5

    251d28bd755f5269a4531df8a81d5664

    SHA1

    c0f035b41b23c6e8fab735f618aa3cff0897b4f9

    SHA256

    afdc6bf2de981ffd7d370b76f44e7580572f197efbe214b9cfa4005d189d8eae

    SHA512

    8111f411c21c6011644139dba4ef24d1696c0f6d31e55ce384e0353a0f3e65402170c502bddf803c3df9149c371b31c03f77be98fdbc61c0c9c55afbe399681f

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\39K1WZBJ\jquery-3.1.1.min[1].js

    Filesize

    84KB

    MD5

    e071abda8fe61194711cfc2ab99fe104

    SHA1

    f647a6d37dc4ca055ced3cf64bbc1f490070acba

    SHA256

    85556761a8800d14ced8fcd41a6b8b26bf012d44a318866c0d81a62092efd9bf

    SHA512

    53a2b560b20551672fbb0e6e72632d4fd1c7e2dd2ecf7337ebaaab179cb8be7c87e9d803ce7765706bc7fcbcf993c34587cd1237de5a279aea19911d69067b65

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\4VT6R2QM\css[1].css

    Filesize

    240B

    MD5

    0627c67183e2190d839d09bff6f988f1

    SHA1

    1002f5550f2d8dde3061712be3708e786bb876e6

    SHA256

    918b59243d6a5caf407fe0835c5c22edd41beda49ecd302c29cb8e3c2c99a72b

    SHA512

    ee5bbf202fc423095e5826ee517a0c54d150bd23d05fb59c2e9132568b6d06c92c9c5fd3af44fb813a3ede46be1bef1fb758bcf5802a0f6bdc6890c2f6f40d64

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\4VT6R2QM\jquery.min[1].js

    Filesize

    83KB

    MD5

    2f6b11a7e914718e0290410e85366fe9

    SHA1

    69bb69e25ca7d5ef0935317584e6153f3fd9a88c

    SHA256

    05b85d96f41fff14d8f608dad03ab71e2c1017c2da0914d7c59291bad7a54f8e

    SHA512

    0d40bccaa59fedecf7243d63b33c42592541d0330fefc78ec81a4c6b9689922d5b211011ca4be23ae22621cce4c658f52a1552c92d7ac3615241eb640f8514db

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\EY3KXMB3\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\U4IULL1L\bootstrap.min[1].css

    Filesize

    141KB

    MD5

    450fc463b8b1a349df717056fbb3e078

    SHA1

    895125a4522a3b10ee7ada06ee6503587cbf95c5

    SHA256

    2c0f3dcfe93d7e380c290fe4ab838ed8cadff1596d62697f5444be460d1f876d

    SHA512

    93bf1ed5f6d8b34f53413a86efd4a925d578c97abc757ea871f3f46f340745e4126c48219d2e8040713605b64a9ecf7ad986aa8102f5ea5ecf9228801d962f5d

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\U4IULL1L\jquery-3.3.1[1].js

    Filesize

    265KB

    MD5

    6a07da9fae934baf3f749e876bbfdd96

    SHA1

    46a436eba01c79acdb225757ed80bf54bad6416b

    SHA256

    d8aa24ecc6cecb1a60515bc093f1c9da38a0392612d9ab8ae0f7f36e6eee1fad

    SHA512

    e525248b09a6fb4022244682892e67bbf64a3e875eb889db43b0a24ab4a75077b5d5d26943ca382750d4febc3883193f3be581a4660065b6fc7b5ec20c4a044b