Analysis

  • max time kernel
    145s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 09:15

General

  • Target

    b94d9a003205050678711129713f45abb7c8e7fd01c4cc0774b1ed4bf3db791e.html

  • Size

    7KB

  • MD5

    d130ce928713fc781a4ad0e92dfb2aca

  • SHA1

    36f3111f1354514a34cb2f8aa0394dde1c86dc60

  • SHA256

    b94d9a003205050678711129713f45abb7c8e7fd01c4cc0774b1ed4bf3db791e

  • SHA512

    fcb5779f133d88936676bbacc70ca4c4ae34e5227b800d4c771c6e1435a4df950402de6c88b585b95a7874fdcd77204567a35c0a6322fac784772917848ff109

  • SSDEEP

    192:cJSG+9PzqN/PR1A8nddLXuSwSTLdlLXugfo2Ku+oL8:mSGabMPvLddLXuSwSTLdlLXugfo2Ka8

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 21 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b94d9a003205050678711129713f45abb7c8e7fd01c4cc0774b1ed4bf3db791e.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4368
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4368 CREDAT:17410 /prefetch:2
      2⤵
        PID:2200

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Modify Registry

    1
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads