Analysis

  • max time kernel
    144s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/07/2023, 03:30

General

  • Target

    TELEX COPY (SWIFT).PDF.html

  • Size

    13KB

  • MD5

    b407b7d307549d3bef90c71bf043fbca

  • SHA1

    fbef824d311a1be5aa8ccce8ce12e8169a7a0cbf

  • SHA256

    411858f7433ceeb804e750252aaec5f625557916e1a8bf90cab650c29e6f57b6

  • SHA512

    e9c5eefcf9697fedac1a2cac5bdda18d473fd07290df150c84dffb87e8c2536d351cef49a594072fe83f2db0ae882ac9602a8b0a55dfd5797724a95b3e1d2b31

  • SSDEEP

    192:EybrqFlF3dlwaoKdag+52SXJQyXiNsUC2zqWtutiYZsWbmn94Lv8Nq6W3vXUDMxV:1YlFtlwaoWagcj3VUCWFtT/Wp8N8vUS

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 41 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" "C:\Users\Admin\AppData\Local\Temp\TELEX COPY (SWIFT).PDF.html"
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:916
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:916 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2556

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    0a6b0ccacb1cd74ef8c9ef1f0f59f9eb

    SHA1

    6ce7e1d3a9c2649e1fc4134308ead4424a285005

    SHA256

    a82b4aaebe249e0bdb2b76dcd80b9a6fa384983787da0a54199d139ce1638194

    SHA512

    08ec6bdedbe390f933a50337141d236383b2ff6c0ffb5c5660cfc05c92b3a6e53dfb868559b54e9ef1ad351465c254278329d0f0db98ae2f79cb7ffee5434124

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    404B

    MD5

    66696fc73cfced482e4283a70fc2479a

    SHA1

    238247569dc8fc709f07d20c78a846646431493d

    SHA256

    a2b00a8a402f378ba3f3545f6da8dbe1e89b86f1368aa712414528a988342702

    SHA512

    98508e5765dbdf5f4e5fde50813ac9165a6c2859c5d508e6164f6e98fda6a243207f5bf32c03dde1988458c8cdd9e485d8fcede41796da18e9d91720888dd319

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\DQKPKJPE\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee