Analysis

  • max time kernel
    237s
  • max time network
    356s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-11-2022 04:19

General

  • Target

    da177db7c6731299e4ed57e69564253146f8ed4fbd3ff8d4b052c687dc176301.html

  • Size

    7KB

  • MD5

    5ee1b7785a9f67f4b03c36c48d0b03bd

  • SHA1

    29d0d42f9dd4d3ac5d5df0e7c258e75d5661b66a

  • SHA256

    da177db7c6731299e4ed57e69564253146f8ed4fbd3ff8d4b052c687dc176301

  • SHA512

    03fc9c3d1cac9e7ff93ec6f1fc36773e68c14dba0438716a76ae11de9afb8ff0acfbb379c52c76c4b781799ec9a89e353d1fcd3ddedf2318cc4392dc74d8e835

  • SSDEEP

    192:SJSG+9PzqN/PR1A8nddLXuSwSTLdlLXugfo2Ku+oLt:cSGabMPvLddLXuSwSTLdlLXugfo2Kat

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 18 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\da177db7c6731299e4ed57e69564253146f8ed4fbd3ff8d4b052c687dc176301.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3568
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3568 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:4072

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads