Analysis

  • max time kernel
    95s
  • max time network
    161s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    14-06-2022 19:45

General

  • Target

    files/Me.html

  • Size

    2KB

  • MD5

    cc64f2b1be564864ef54387123cff924

  • SHA1

    e8eb443e51f40569bf70ccd561bced5aa0f424e1

  • SHA256

    47561dcf8de30f82a5e749bafc875d3703fd6c7f7d0930e42ef58888b06b1a11

  • SHA512

    8af809fc1bd82abcf60778779d4c8f5d5d900fbdde5c4af9a4b94ee013790e15144977524d8f5435dfa968d04e8aa1ac2bd529104cdcf284edf25c512f7ab859

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 56 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\files\Me.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4992
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4992 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:4248

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads