Analysis

  • max time kernel
    109s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    24/11/2022, 04:14

General

  • Target

    86388923f6ffac691f38bb407d9ea75017c895cc3dfa52ca6c3397f8740f1781.html

  • Size

    7KB

  • MD5

    11980102f5f0c7888613017f213043fd

  • SHA1

    92f3903ccd3d8615b5132e78bf578ab4f11d381a

  • SHA256

    86388923f6ffac691f38bb407d9ea75017c895cc3dfa52ca6c3397f8740f1781

  • SHA512

    6dc918b6375b189ba4788cd4ead838839628d10911627eee699014493d01507de715731f06227b2e91f8ad3e738813dbef507bc3e3535b7a69b7c1ab69feafb8

  • SSDEEP

    192:QJSG+9PzqN/PR1A8nddLXuSwSTLdlLXugfo2Ku+oLz:aSGabMPvLddLXuSwSTLdlLXugfo2Kaz

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\86388923f6ffac691f38bb407d9ea75017c895cc3dfa52ca6c3397f8740f1781.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1276
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1276 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2032

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\BHNK0M25.txt

          Filesize

          601B

          MD5

          96fe15effc9114efc91112163b8e29f5

          SHA1

          3847c6912b0863cf639b82c649d5e695fe54bbe2

          SHA256

          43b4b2b1a1e1e5fb55b7f02ee8f3216ecc888bb6718b34ef50b9276e48191b28

          SHA512

          44a4c97d9fa5f86a41468f4f2372035c7ee0970614d93f322e35494cfdb35aa5c200f9eb94a9d32f743943a57edb7159501d3fb8406a3eef06e2d04edb8c397d