Analysis

  • max time kernel
    205s
  • max time network
    210s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 09:08

General

  • Target

    fe07061b93a53905bc380776f5b6e3d2be6ca62d368b6f31c13563a50187cbb3.html

  • Size

    7KB

  • MD5

    69f77c70d2b975b9afb78d1e28d56782

  • SHA1

    9b70b52cdc7bc5d49c0bec11e083989ef32c5098

  • SHA256

    fe07061b93a53905bc380776f5b6e3d2be6ca62d368b6f31c13563a50187cbb3

  • SHA512

    a54c97ad59cbb5cddef6e08d023a7a64d1399d4ec1dd6f24d1c829176ac8c86ce0c589e70a10ed756ad7867763f22d150f3a351cbe7547bf864a0375d71c0c82

  • SSDEEP

    192:bJSG+9PzqN/PR1A8nddLXuSwSTLdlLXugfo2Ku+oLO:tSGabMPvLddLXuSwSTLdlLXugfo2KaO

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fe07061b93a53905bc380776f5b6e3d2be6ca62d368b6f31c13563a50187cbb3.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4248
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4248 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2068

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads