Resubmissions

30-11-2022 02:05

221130-ch7lvscb8z 10

30-11-2022 02:01

221130-cfxzmsca4x 1

30-11-2022 01:51

221130-b9x13agc22 6

30-11-2022 01:32

221130-byfbwaaf51 1

Analysis

  • max time kernel
    163s
  • max time network
    205s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-11-2022 02:01

General

  • Target

    b728b6fa-ca97-43da-bf3f-13f86b8ee983.html

  • Size

    637KB

  • MD5

    2d9fc73397ec9f722163ca97db847b68

  • SHA1

    ba3dabc812f0e9805d27e750e2f041ac0db06a11

  • SHA256

    1144f930260c12b3931b944435967789584da516d019578541b6877068fca3e7

  • SHA512

    7348b5c4456b56d3678d8a8df7f66abde07acd0e4bc6414c661e9ef9e73395c7ef87f24451ac72ac64f4d6c173689e361bb57d18ce529f980920198d7bb035db

  • SSDEEP

    12288:FKlxGaDKqDLoaZghNHbq7tp8dgJvrKoKiLGD:FKlxG4KqDLoBNHiT4q2iq

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 14 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b728b6fa-ca97-43da-bf3f-13f86b8ee983.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:216
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:216 CREDAT:17410 /prefetch:2
      2⤵
        PID:2268

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Modify Registry

    1
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads