Analysis

  • max time kernel
    149s
  • max time network
    181s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-08-2023 22:00

General

  • Target

    100.html

  • Size

    1KB

  • MD5

    2139d60bb5101eecc3404c7fdead1055

  • SHA1

    3d0ef03e8890f8826a39e1ac124c82377034d9fa

  • SHA256

    cd570a0eb442fd3f9745c977b80f5d202d05731906616b2d9a863f08fe6261e4

  • SHA512

    d2beada8787324d19f83c9bd5aec239c828d0643957fd99e908c740560e4b2b9cb4291cd1bb289d841c868bd697453625f351a473fdaf38b416c10a173eb69ed

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\100.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4844
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4844 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:5052

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157

    Filesize

    4KB

    MD5

    24be8a92460b5b7a555b1da559296958

    SHA1

    94147054e8a04e82fea1c185af30c7c90b194064

    SHA256

    77a3cfe6b7eb676af438d5de88c7efcb6abcc494e0b65da90201969e6d79b2a3

    SHA512

    ed8ef0453e050392c430fdcf556249f679570c130decd18057e077471a45ab0bc0fba513cb2d4d1c61f3d1935318113b3733dec2bc7828a169b18a1081e609a0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    c890b903fcec9cf731ff05696767d3b4

    SHA1

    02173ab9596c44d68deb2376ebdd18681fd35088

    SHA256

    7af23c976085389fd7e24692412ae2f38b6ce66b5494baf6c05465ac336f0811

    SHA512

    cb509b719fad2cbe879a19cfc606cef0a6fb5f61c6bd9baf230c8e124fa755225c50ef7d58eb0889a083fc859015f469a92f09c0bd9eaa5ceab3e8fca85bf01a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157

    Filesize

    342B

    MD5

    87f0304813f2e551454db69f398ebf87

    SHA1

    fcd7985018b6acf6733517a68f2527f0ad5906de

    SHA256

    a07abab1e8fbd2f698f1dae68c489a8d8d74323728a60d2223ab7d49adc6e95d

    SHA512

    ec5225a1cdc1f6bb2cc0295fe00e354536267f19ecbad61c15dc6afcfc4d30e1ab2bd7c5909cb4c82167b6bbb62c013e507dd821ef0fcbff92b9b0e0deb37afe

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    404B

    MD5

    4922146e1fab860096bbbebd0b288fc8

    SHA1

    1089b93abfa3301814de8bbb29dc62c6c1d73f88

    SHA256

    0d841664038c8043f3e23738c5f874ded67f0ff1cb06572b960539fbbcfd25fd

    SHA512

    1b3cd473e41f9b97bd685a45ff1159f7b8ee86dc06d5dc929a80d08469534b03e6b48f697d984068ceec68695abe3936ceac445ceebfab6b91ce8b6bec7a9c88

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\VersionManager\verB731.tmp

    Filesize

    15KB

    MD5

    1a545d0052b581fbb2ab4c52133846bc

    SHA1

    62f3266a9b9925cd6d98658b92adec673cbe3dd3

    SHA256

    557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1

    SHA512

    bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d