Analysis
-
max time kernel
119s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20231025-en -
resource tags
arch:x64arch:x86image:win7-20231025-enlocale:en-usos:windows7-x64system -
submitted
01/11/2023, 23:13
Static task
static1
Behavioral task
behavioral1
Sample
View _Document_Hhtm.html_
Resource
win7-20231025-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
View _Document_Hhtm.html_
Resource
win10v2004-20231020-en
3 signatures
150 seconds
General
-
Target
View _Document_Hhtm.html_
-
Size
9B
-
MD5
8f27d7a768ffa9ea267e4da2ce6840e3
-
SHA1
41d4e5cb54fe14d971c683b0ca3625f3fa371ceb
-
SHA256
bbcc63918dca4235d53a8aeba75b718c38f95369e4285c90fa05ddef0b6851e4
-
SHA512
99047a0ce4a51e0ea319a902a49562876e203443ad6b18029bc93575e55a8f374ff0f38ebe5a7a0e5cec71e4119cd8112d4c622ed695bf5d3f31fc783fcb5720
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2616 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1744 wrote to memory of 2616 1744 cmd.exe 28 PID 1744 wrote to memory of 2616 1744 cmd.exe 28 PID 1744 wrote to memory of 2616 1744 cmd.exe 28
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\View _Document_Hhtm.html_"1⤵
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\View _Document_Hhtm.html_2⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
PID:2616
-