Analysis

  • max time kernel
    258s
  • max time network
    312s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 15:30

General

  • Target

    47726f3e45620936a066d7eba646d2ec5c0018b896247670683a27b2fb20b349.html

  • Size

    23KB

  • MD5

    3070197f82acee093693993e97bf7f71

  • SHA1

    b7ac678cc9ce540d2160315e495203a4a34b8fa7

  • SHA256

    47726f3e45620936a066d7eba646d2ec5c0018b896247670683a27b2fb20b349

  • SHA512

    349828bcdf454e62a12f897205d29deaf460bbbaf2d787f178a2f3daeedd943e466831a6621119362180289cb60cd534673cd71e1625609c9333d8d696f9cb87

  • SSDEEP

    384:NUql2166TxVdp91+tSi4cNaR2yhYHE2EW4edQ7j8yPJJAOAxd3aHnidIByXDqeaP:eql666TxVqt4u6fSl0NmbrqHYio1zyQ6

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 25 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\47726f3e45620936a066d7eba646d2ec5c0018b896247670683a27b2fb20b349.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3628
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3628 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:3048

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads