Analysis

  • max time kernel
    135s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/06/2023, 09:42

General

  • Target

    sample.html

  • Size

    33KB

  • MD5

    62b36bb2a34fdd6235d9307257143400

  • SHA1

    e528cfddc126e417304456050ae359cea81f2add

  • SHA256

    dfc229d0ffd8bae36f9a36411f6a87cb24303fe414e9721024d08be655dc00c4

  • SHA512

    28e15aa4d8314336b166216bf7d231727eaa0527d49d4cf9c20e5517b51fa586fb7e7cdb179c2089461fe430cfec434834eb046afa37197073d66dbcce0c3347

  • SSDEEP

    384:Jm6DSuSJ6g+pDhfTPA/eFMTKQqTq01Wt219Qx/mptc7UiNzEeVEwmy:4KSuTgmPA/gMd61OYQx/seVEvy

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\sample.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4876
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4876 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:3228

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    82b6e24e9d7fe90d647b5b81389401b3

    SHA1

    51f3af35027bc77cf6912e6dd3d6cc3289c19c55

    SHA256

    3483fda8fbc0fa1d77780c1c46e372c3bc834a45b19d149d0dbc8c2fba26322d

    SHA512

    3454b31c7111bdc0cf6ec133ef1dd6755abf0b006f77341b904fbb8ad25a81b548accc510f1590c2a3955f5bf86f8b023404e1acb9d2b028bb29067848936f7d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    404B

    MD5

    90ea0e3a2f387832982851e7910a822f

    SHA1

    2beffb52b27413a2aed6afb059cd0cde94c1b23c

    SHA256

    dbc6c2e624af5ea1521fed9d32383891e88eb8af75d3bb8e819dfdce2787a926

    SHA512

    2f5dadbcbe877c6d47ffa965dbd2c98620d93f0543b0668a86b8beb3ae8d29e02c491c867a32cd6ff78e077185ee157f7e7cb2081c2fe2cd6f6f5dff9cf7e20f

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\phzg4yt\imagestore.dat

    Filesize

    2KB

    MD5

    2f754c6a01a2039a707b45e605081d1d

    SHA1

    9be9b31b313e50e6d23e979b9b63edb311f9b4e3

    SHA256

    bec38b6e7799457964c0ac52c3cd886fb24e3f039fabc23a62769e2c3312c1e1

    SHA512

    e85c18ecce6c47e28760d4fcc142f84cc48cec4b53ae941d6c8d29437712e713853ac5684d7e7548eb73cef3d7763ead7a31ce389283bf1d50de0f7c3bdfe52b

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\4VT6R2QM\favicon[1].ico

    Filesize

    2KB

    MD5

    0a362a1a0cf4cc6bc56d65db8049dd6f

    SHA1

    ebfd1b824377525e1588719e935bf4b06349cddf

    SHA256

    d994f806b1e4225b50be5ab681b2cecf845cc216a19a432d878cea3cb815bafd

    SHA512

    9bc3349815f97884a92965f5936a7abc4ee937232f305148bd6d791de0d0199c51c5a314e6f4f5efbcac925a860c8da4da6e94472471f36db7725caf4b49ac8b

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\4VT6R2QM\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee