Analysis

  • max time kernel
    135s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/06/2023, 02:09

General

  • Target

    916775167caac5745bc1095e9ff654f8.html

  • Size

    5KB

  • MD5

    916775167caac5745bc1095e9ff654f8

  • SHA1

    d563e1388016bbdf2b2a47970207a4b966eadc55

  • SHA256

    53849a4eb386b120629ceceeac78861ddbf73209c5f2be0b0d7a00df95b10dc2

  • SHA512

    6476bc71f0772021c8e828f783c20a974b34d62cc17b5306eb0a5e5fc2fb2b66dab37c4028bdf70aab7ef36f9f0505383a241968e98b2f80d8d98ce6f8b24629

  • SSDEEP

    48:TApOqA5BAFzPJhVI/CLQfvaFzYsWzxeqs6Gp7vlcg793cjvynM:jDEzPJhkCBzglsZpzlcgJMjvyM

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\916775167caac5745bc1095e9ff654f8.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:948
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:948 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:400

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    a244894fbc1ca90d08cff32fb6cd308d

    SHA1

    59e3c026c3d1bcd549f697b5dd4a35e298c9d2be

    SHA256

    a6b607b594b789a6ab1671c98fe9447509b82a85cfdcf4693b253616568e32ac

    SHA512

    b62e636d9d0e9e67ff310f3370ab1ca66abf93efef89a9a0d6d79e4526d8904a49b01f39ce64b76d3db03ac7080f62a84caabfbfc7bbf0244e2601457ca7e09e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    404B

    MD5

    2e836acc62939a480b2d0c5b71ef879c

    SHA1

    d6467596090a4b71f623414b9d40834f24d009b1

    SHA256

    707a3b38bb23a0bb90ff7a5098f619d7f16634f3d6586a84dd935e54427ca48e

    SHA512

    1f19693e7d1ac56b2bdeb11b5f2a127b625aa71d633210930631e72b81a07dff5b0c3a246bab0bae936672fc15b1677eb0501d5e92979159899ec763922de6f2

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\4VT6R2QM\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee