Analysis

  • max time kernel
    124s
  • max time network
    76s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/12/2023, 19:08

General

  • Target

    36cc15a4dde5355c8486ac1a7a976a76.html

  • Size

    18KB

  • MD5

    36cc15a4dde5355c8486ac1a7a976a76

  • SHA1

    e6c3956ddfbd1d0195e3b1d8d720ce19d5bd93fb

  • SHA256

    9b241422795bf67a87849da637902871eba9f5aed2305e2102919224641396f1

  • SHA512

    8d63aedf9a7bfe5811a48058e7b0a535c4ee1a4c8656099917a74f0259e92d3832abf7c7c72bed775fda90692d4708ece2427adf69c355d7508d33a2c45509db

  • SSDEEP

    384:aqrvpbbahr1AgdGgs8jMaztTLPAuz68MMv07e:jN3K1AgdGgs8jJO8ts7e

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 43 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\36cc15a4dde5355c8486ac1a7a976a76.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4876
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4876 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:4284

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads