Analysis

  • max time kernel
    145s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 15:30

General

  • Target

    qunfa369/Images/table.html

  • Size

    10KB

  • MD5

    71ea7f3992ef2d8930f2474296883e95

  • SHA1

    e4cb19c6f8542d12c7eca65f1ba85ebb22b8800f

  • SHA256

    e87a7a69e5318e10762ccb4d0b5ba932a0218ad0303911da4284c28eff118e7e

  • SHA512

    50254116456b25cf28f00c5caa326b1e02c801c253120146348516449d910a347101f502a934dc4854e5c6a395e8f9298f2603b12e58717415ba642a1c49f8fe

  • SSDEEP

    192:tm1+2YgncZAoGaJ2sCDVcRw1CL3bD7l45ZQqXJhDXohqaKfGE4N:tm1+2Bc+1VZcRw1CL3gZjh0hqBfGEK

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 41 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\qunfa369\Images\table.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1952
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1952 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:4276

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads