Analysis

  • max time kernel
    91s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/11/2023, 02:58

General

  • Target

    __wap2appswiper.html

  • Size

    46KB

  • MD5

    1c12c6acf6fdc54dfb0f95eeb194a8d8

  • SHA1

    2929069e0afabd18fddb0cc19bc40cf20c6d14ab

  • SHA256

    a15d08a42cd2453735661c137c82752a7187844adb39a1954c77ef2224b717f5

  • SHA512

    ac8a0b317fcb8b7275836e64b0a2590523e9e9915fc40482668cc924db994a5749549802f2a6e23071c4cfb0c21e69423ae51b209bfebaa6e600a688beb10eb3

  • SSDEEP

    768:Q5Y612Wm1NFxyL7mbHQYUQO8JpL55bzI+eWTlrKBQLS2SX7Dvjxs8lcu:oYfnmLSU1/8nrA69KWmp9s8lJ

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 41 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\__wap2appswiper.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2852
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2852 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2264

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    5b6c612c8dbc193688862f41d94973af

    SHA1

    222d27a289f731d9396379fe3f8b69c904358ec8

    SHA256

    ef6743c8ca2bd1973be978c93d5c506f2b4feb1718e775973071f44d4cf3d99a

    SHA512

    f12487b748c0da1abb46e158707eb82b101d32b8ac3c246b265458c952dd848e7b35eafd3c572080a781431bbf9ae680fb6b1f1e876e5e807f3aa173a7c44c7d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    404B

    MD5

    e2065f6d8f851fc5cb294a0e1abd2bb0

    SHA1

    ebb27f70cb074b9db9a7abf13936547f752e55fc

    SHA256

    3cb9cf6e46ca2f099d7fae03bc299eb976e78f5d410717de4f78ae3b00ca97cc

    SHA512

    8c0ca0d3b148c560141f39822c94418e1445222c2e39755d2e66758614967f1eee2b57071496525cd5ff04fe397539ae7c83b2b384015f3d523f0cd898364329

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\OAM0FGD0\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee