Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231023-es -
resource tags
arch:x64arch:x86image:win7-20231023-eslocale:es-esos:windows7-x64systemwindows -
submitted
26/11/2023, 22:02
Behavioral task
behavioral1
Sample
index.html.1
Resource
win7-20231023-es
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
index.html.1
Resource
win10v2004-20231023-es
7 signatures
150 seconds
General
-
Target
index.html.1
-
Size
246KB
-
MD5
9321a4e2cd4141a43965bc0dd98fc46e
-
SHA1
43efb3b3e1da7b4788d27c9549264b5d2a111cc2
-
SHA256
000444a623568f34fca2d4281a5bb95c13686514625941b4c53c0db63762a872
-
SHA512
7cb7a78d8575bda664042c1a5a6579f6caea344493cfc6be754270cee57b53932698db9ee9c268249f444bbe144243c83795b218973f6b90f33c96d6f11808b7
-
SSDEEP
6144:R0Rum7mdLRp1bbSBIR/EHGtCMXgTo8qoFt/etg+21pbys:R0E3dxtR/iU9mvUPGys
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3028 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1808 wrote to memory of 3028 1808 cmd.exe 29 PID 1808 wrote to memory of 3028 1808 cmd.exe 29 PID 1808 wrote to memory of 3028 1808 cmd.exe 29
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\index.html.11⤵
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\index.html.12⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
PID:3028
-