Analysis

  • max time kernel
    257s
  • max time network
    283s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-11-2022 04:17

General

  • Target

    2b2fe172fc3807bee7dfcf3e0aaa26ad652a61f97c39849c3ce5b758b3b61577.html

  • Size

    7KB

  • MD5

    9ab6ec97e550ef29608536b47e1ecd83

  • SHA1

    26def28d3ebd2ad3465250dceb779d7f888f1512

  • SHA256

    2b2fe172fc3807bee7dfcf3e0aaa26ad652a61f97c39849c3ce5b758b3b61577

  • SHA512

    46f33dfe0f207b2381c4aaa46a9e4c21a4b2d16b3ab6f57c2b191f074669dc75129e082f2424e1d4d17c3114267777aa9536d05729363d4209336f526506e644

  • SSDEEP

    192:ZJSG+9PzqN/PR1A8nddLXuSwSTLdlLXugfo2Ku+oLT:LSGabMPvLddLXuSwSTLdlLXugfo2KaT

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 14 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2b2fe172fc3807bee7dfcf3e0aaa26ad652a61f97c39849c3ce5b758b3b61577.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1392
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1392 CREDAT:17410 /prefetch:2
      2⤵
        PID:3692

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads