Analysis

  • max time kernel
    124s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-11-2023 22:00

General

  • Target

    sharing.html

  • Size

    908B

  • MD5

    d7f970599142df2f70b65b588d3f2cea

  • SHA1

    038baea59834e1531d91e4f6f87e05a37146c68f

  • SHA256

    206899af0c080bd16541278d9ce439f9ae3debb6b3e3b0d0b0c49a14c1708a72

  • SHA512

    3d4db4abcbc425c5d2946e43905f0df0b2edf0861a9b09a5e41d73120ddc345bfcc96934f859a22e72e399deee16f3358b75186ef7f87fef42d43a0001147eab

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 41 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\sharing.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1444
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1444 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:3608

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    7bc1352ddba5108aad2ba4f8dc7fd138

    SHA1

    115f349b60dbda0a5be6546362a4561755ee66ec

    SHA256

    5880434d7a59152766862a06d0a20ef7a07c983bea04471bfc43f56ec530ec12

    SHA512

    0ec0c8fdf933fff74ad0f549bf0bc8aa42d5dfb160fda7169a09db7eb35e68890c2ce90a9f9c143f19f9d832f7c19794602a83ae706ba122c39604d89e7eb113

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    404B

    MD5

    593ea0124cbd56f6b383afdc809c0263

    SHA1

    3f200b3ccbf7316bdbda09b4e226549f335a28dd

    SHA256

    70b4a069077bbc36214de707b48f0e78493975de0d5226a929b9ca8d6cb8d2f2

    SHA512

    5b63cdac6677b4e811fd736bd30b2f8ff92bdddaebd7f62858f1a67a8bf26da5ef12001fde1176b51e21520e5cde69aeea39e879981fc6bdd5d7bfe86bbec459

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\5T0U3BIO\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee