Analysis

  • max time kernel
    139s
  • max time network
    159s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-11-2023 22:00

General

  • Target

    app.html

  • Size

    708B

  • MD5

    63ec4137ec1dddb92fe9a6a6d4837921

  • SHA1

    7fb1d2517bd8ac16df3e9ac77249f6d9b36b32a0

  • SHA256

    f3c0cd68e1a826c4f9c2301bf29aa4c299477cbec2b65e23b0e3c8914a294a1d

  • SHA512

    4fbc2e5751216e12627389c47711788e9f3c172e28e4150d389dbcfb6ce268de1354eac6f12f9ce36ac70dab1c06d3fe85d1233006aab1fef06b186f4fcc4790

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 41 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\app.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1060
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1060 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2080

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    f59a457c6a757d896155506680f2a4b3

    SHA1

    729ff9a74596409d0df20a5117c50bbfee1d53d6

    SHA256

    8fe76d55560f116cbdc82d512589ec5a122688e1d4d38a1ea6af65596156b988

    SHA512

    c0faf1a2e216ecd8ed1b7dcbefeee6101f7b443da8a944bdd311fead18e6522458aaabf1ff1ea9354d9d78e68a48132022e45cd21ae4094b17a29b746ec5f93c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    404B

    MD5

    a3484bed6e5fd59d863380552412d8d0

    SHA1

    7a64d897f8f32cc6ea881fd849af007375e7e687

    SHA256

    6dcdf5c0f0f852dc09badb60c8609f72ac150731658f4c349b7c62f54cf8ffd6

    SHA512

    0a3d37f03c5b627088e8ddf3f54fe4994b05e34fcce9ffe089bd1913884c9607441c34d15ad22686a6b1aaa76c1ea9cf8575c760633700a0f0e9c7e4b5dbce20

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\5T0U3BIO\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee