Analysis

  • max time kernel
    197s
  • max time network
    209s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/11/2022, 22:59

General

  • Target

    fe53be77c1a6f1ea012ff0d83ede099b99f2bc0e3c4f402e889c9168b24d812f.html

  • Size

    7KB

  • MD5

    31937978a7622d0a092cc9b7e4763358

  • SHA1

    c359d21ef68758ef69d5f71367bab0c1793973f8

  • SHA256

    fe53be77c1a6f1ea012ff0d83ede099b99f2bc0e3c4f402e889c9168b24d812f

  • SHA512

    d2befab906bdb5c5fb2630d1aa63239336849cd73186001ec756dad75cd8d841d694c99c47f222bc1611fb3211a223f00b1a0d0831b1cc8d7a3adc25ff03973f

  • SSDEEP

    192:6JSG+9PzqN/PR1A8nddLXuSwSTLdlLXugfo2Ku+oLu:kSGabMPvLddLXuSwSTLdlLXugfo2Kau

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 14 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fe53be77c1a6f1ea012ff0d83ede099b99f2bc0e3c4f402e889c9168b24d812f.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4140
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4140 CREDAT:17410 /prefetch:2
      2⤵
        PID:224

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads