Analysis

  • max time kernel
    122s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20231023-es
  • resource tags

    arch:x64arch:x86image:win7-20231023-eslocale:es-esos:windows7-x64systemwindows
  • submitted
    26/11/2023, 22:02

General

  • Target

    index.html.1

  • Size

    246KB

  • MD5

    9321a4e2cd4141a43965bc0dd98fc46e

  • SHA1

    43efb3b3e1da7b4788d27c9549264b5d2a111cc2

  • SHA256

    000444a623568f34fca2d4281a5bb95c13686514625941b4c53c0db63762a872

  • SHA512

    7cb7a78d8575bda664042c1a5a6579f6caea344493cfc6be754270cee57b53932698db9ee9c268249f444bbe144243c83795b218973f6b90f33c96d6f11808b7

  • SSDEEP

    6144:R0Rum7mdLRp1bbSBIR/EHGtCMXgTo8qoFt/etg+21pbys:R0E3dxtR/iU9mvUPGys

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\index.html.1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1808
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\index.html.1
      2⤵
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      PID:3028

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads