Analysis

  • max time kernel
    217s
  • max time network
    324s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 09:31

General

  • Target

    23965a31886c7c6071a236c916e029f8c11bb8784434a17a7a080ddef02253c8.html

  • Size

    7KB

  • MD5

    fffcb102eb2c45ae43a21812821da1b2

  • SHA1

    f289968017355da5760a3fda37e238b3e129b5a3

  • SHA256

    23965a31886c7c6071a236c916e029f8c11bb8784434a17a7a080ddef02253c8

  • SHA512

    57dbeae428856a0f37fc6bc7b2b7ddaa25488427acdd1b570609f5c21175e2a5b3cb7490956e9f6f2506ef2da2215107c11c58f1be1aa7828e6954e11aa71791

  • SSDEEP

    192:7JSG+9PzqN/PR1A8nddLXuSwSTLdlLXugfo2Ku+oLx:NSGabMPvLddLXuSwSTLdlLXugfo2Kax

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\23965a31886c7c6071a236c916e029f8c11bb8784434a17a7a080ddef02253c8.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:668
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:668 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1844

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\EZ1KNK22.txt

    Filesize

    601B

    MD5

    a27941facc6a6aae5d30eca25eef5b8c

    SHA1

    64d42200908780c2f976625f1b3a378e3d147e82

    SHA256

    97ecf70726ae73984e2f0721f384b677ce8af5bfb5090d436488a1a5ded2d7c3

    SHA512

    16f4b5a6b83ffb3070d3e81384e2fa0fdc72154ec241edb32247fefa9fce25e309fee8f08028f93bdcbed9ec70fd5b7f4013fb32bbe8c3f32508367ca516cfdb