Analysis

  • max time kernel
    135s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-es
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-eslocale:es-esos:windows10-2004-x64systemwindows
  • submitted
    03/06/2023, 16:48

General

  • Target

    index.template.html

  • Size

    3KB

  • MD5

    7da72350b79aa811f5eec68776aa859a

  • SHA1

    7a3d1dc07213c67cbd67d70d121c22e7eec7d593

  • SHA256

    b7abecc6aff5f4bebad3e62175010cdc6de5a9468b5e3d58c09efb980680bfea

  • SHA512

    6bf16063026899e16cc6115ddd5c48dcf8017a18564543f1268b9533d0a1669fbfe72cc335a929adef2d6ea15fb27de09f1fdba2e51f69d6660f692028555cc8

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\index.template.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1432
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1432 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2584

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

          Filesize

          471B

          MD5

          91e4d7712b64a4110e170c0540645479

          SHA1

          67f793d3f426625f72acf703efefc44cc705960e

          SHA256

          19029a05befcf52a40f31e88d9d073fbaa1b6cceaec050e11bab22f307f0923c

          SHA512

          cbf529565dda78743c48e0b4b39f71ca7679cce651afc54d28a2b0284ccdb1e4ffb6b10bfa25d8bf19da71546b48bdd5e6c2ca04e9d83c7f0afdb4c49d1e030f

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

          Filesize

          404B

          MD5

          ce75220908b3a4abea7dc2d88cbc7aa9

          SHA1

          b4534875a35a5dfa62cd9a7b7bdfe44889275efa

          SHA256

          94ce72a2c85894d8c047ff9998de999089499a9fc567c9c40b3b6866df84802d

          SHA512

          ad48b4c947a7e0505e259a49f0a3810f33fdeae64197228c05aa69edf592072f08f7a88d772501f677a812b28671fee6a9b4b552913dbade39fbeaa9ca881ca2

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\LZ0AI98S\suggestions[1].es-ES

          Filesize

          18KB

          MD5

          e2749896090665aeb9b29bce1a591a75

          SHA1

          59e05283e04c6c0252d2b75d5141ba62d73e9df9

          SHA256

          d428ea8ca335c7cccf1e1564554d81b52fb5a1f20617aa99136cacf73354e0b7

          SHA512

          c750e9ccb30c45e2c4844df384ee9b02b81aa4c8e576197c0811910a63376a7d60e68f964dad858ff0e46a8fd0952ddaf19c8f79f3fd05cefd7dbf2c043d52c5