Resubmissions

13-01-2023 23:34

230113-3kgfkaeh65 10

13-01-2023 23:32

230113-3jkrlaag4w 1

13-01-2023 23:13

230113-27ve9sef94 10

Analysis

  • max time kernel
    68s
  • max time network
    74s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    13-01-2023 23:32

General

  • Target

    DocumentScan_12-23#122.html

  • Size

    646KB

  • MD5

    a63b4b055759b39d74b8e3650e251b70

  • SHA1

    be9a4c65245aece4c26210395cc0472a86ae8c27

  • SHA256

    0566ca0f99c573cc121e20ef7c95384ad8cf49268ade581041e077e5ebf89d74

  • SHA512

    31c3fd076dfa8e976c3602574ab2a623471399cd7211cbc2618cb66eecf5344a6f3f15d6fafa0412dfaf85034b30cb073ee774d24836384e413ba6e9adfefcce

  • SSDEEP

    12288:Ff7Zg0rMUUsvb6g51o0P20o3RcrBgDxQ28ZuGe+VmVWVQoAK3Yx3JSxcYq:h7Z3rOsvXor0w+8IHfc5SU

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\DocumentScan_12-23#122.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1404
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1404 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1508

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads