Analysis

  • max time kernel
    144s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    12/06/2024, 16:37

General

  • Target

    Fish-v327-0221/kdocin/p-00839798380738.html

  • Size

    36KB

  • MD5

    02b87ab2e8cc4e6e5da057ac9e446dff

  • SHA1

    d00f5694953b16540478a9093795d09f70d1525d

  • SHA256

    e90cd42fa161551bbba1e8941e75348a6f4d8c8f8aa6242c6e14470ead08251b

  • SHA512

    b1d39bce3f936bbdf88797d30401ce649b309b4d6a5deb7337a446e0237aab81944cc9343fd611e13450f2b9bfd047ccd2083a489d3828fdf794552f4b4f067f

  • SSDEEP

    768:pRlNcBbrVG0S44E47wNYF30DZwu3efp+K4dKIL3QujlHTIg:3XsRG0S44E47wNYF30Dm6K4IIL3QujlB

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 26 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\Fish-v327-0221\kdocin\p-00839798380738.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2792
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2792 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1284

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads