Analysis

  • max time kernel
    193s
  • max time network
    218s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-11-2023 13:59

General

  • Target

    Bv9ARM.ch10.html

  • Size

    6KB

  • MD5

    eafbc5930737621e96e3572d1cb719f4

  • SHA1

    1f11dc541f11ad5a7011bcb052388c52a2e0d268

  • SHA256

    919e5397232de541ca532f83360c77c7c12cd03183678150766cf4cd47acb907

  • SHA512

    bfb6e9e5ddd06688e7b79b36f0daa8b1c401bf2b555888007479dea8ee1c4602b3fca16aa0cf617defdb979654b5b6dbdcbbc68181fab524c2b988b9d7459202

  • SSDEEP

    96:ZBAvOHe5T50VV2yNaLgAAKyfdytI4gYI7XJ4zJa1JUC/byKD+qmWzrzbKpmAbsdU:ZyvOH5OyNS28toma1tDHaHPTy0

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 29 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\Bv9ARM.ch10.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3388
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3388 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:672

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads