Analysis

  • max time kernel
    141s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-08-2023 04:00

General

  • Target

    index.html

  • Size

    4KB

  • MD5

    bf6b5aa0cf8a83e2c407e521411e6901

  • SHA1

    6065fb44fa51b7803c507ac19693b441890e2ab9

  • SHA256

    44940f08969f4852da010011f852b02f3e032fb22ed65f4b32317e91ec33d48e

  • SHA512

    23a42057d41cc0d1ee9fe8119f5b14d57fcefda997b3f316127e1c71764bd23f408a4a427bdd5cd076b37b77d52c60b395bedc860a9bf0d79e11f41e7aaa70ec

  • SSDEEP

    96:LzJKsdyHkMoiibGyND+KkBpkcVH2tprECiJVInhZu/H7oZe0j21Wdj:TyEMiKyNiKkLVqpozQm/bNpWdj

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 41 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\index.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3164
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3164 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:4712

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    47d7a79abec2ba8497f119e7d7538ecb

    SHA1

    af3c471309cb35d8cccb33c7352a3d73cc9a14dc

    SHA256

    f99a369b6567f5eda9fc5d6abc2fca7c7ac66b3a3ec161880af75a9e0220e995

    SHA512

    bf29c161f1990ebb39d8fee4ba65cca9e1988046505960995c32fd8e5b1ef501b6221c3d24a7834eaf3fbb42a87dd02ec7298bc897885e87b22c0a292f8afd4b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    404B

    MD5

    456c14e8685d3a3be4edf588eec0f08f

    SHA1

    60a9c3a14ca7f48b0f723f47107af13ee834473c

    SHA256

    164e2249003251db9a516c7920cc07c3b436d56b198f1c44c93f07906a3d2215

    SHA512

    5180556adf18a644863708ae34494ff6f2872ccc9392a76018fc411c4fcfc40a1a7f57b5e75a19349a5a954be60720b4ce306507a7d333688e6dd7bf2809fb9c

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\IEREYVXM\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee