Resubmissions

05-12-2022 15:14

221205-smedwabf89 1

05-12-2022 15:10

221205-skaynsee5w 1

Analysis

  • max time kernel
    237s
  • max time network
    320s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-12-2022 15:10

General

  • Target

    PDF File (1) (1).html

  • Size

    22KB

  • MD5

    362c4dad867f3fdf9fe3c4808fa20215

  • SHA1

    2618e47d94b09eda56fb436f614bd74efd7aacd1

  • SHA256

    3f1779948e5d73da23837ef4f39e285b9d6bd4a029589bbf51e62557b3abd2db

  • SHA512

    b4c27f5900b0b220847ab7bf5d8f9b388fd70e6df3e38d33209f572575a2fde9621f7d377d3df26228cdaeb67464e8b37413f0bd1b906f354c942f0f427f35a9

  • SSDEEP

    384:hc0s1A4iX8i/VyvXxBmjiIOJGsfVNEtND6NSuNBto8UHAm9VN8tNPRNvtj8UQtAl:hc5ChsvXxBm3XjPeHjvDZAFGE2R7v

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 17 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" "C:\Users\Admin\AppData\Local\Temp\PDF File (1) (1).html"
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4296
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4296 CREDAT:17410 /prefetch:2
      2⤵
        PID:4972

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads