Analysis

  • max time kernel
    143s
  • max time network
    173s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-12-2023 07:26

General

  • Target

    5c773010e675945442ef9b9b7b612394.html

  • Size

    33KB

  • MD5

    5c773010e675945442ef9b9b7b612394

  • SHA1

    284d1ecef6a8a4f1817996dfd77a61cb85ee4235

  • SHA256

    fdffac66ad0f2f982ca85e05c07ef027db910a9b40fdfbed33e1cd10dd43f914

  • SHA512

    accda2c08aa3eebaf737dbfb2c2c7bc9cca7b263175e869d01cd2e5c98c9215d6259bbb8ba7fe5a5ae76b59e72270dcc39d8f089f039293792007a91c9660b7d

  • SSDEEP

    768:evXDLMdiUlS99yIvKc3BU30y3FP3w93zm3ok3lA3ZCU/c56KE+YE8:evXHMdbs99yIvKKNgoN3umCU/XKE+YE8

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 21 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5c773010e675945442ef9b9b7b612394.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4456
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4456 CREDAT:17410 /prefetch:2
      2⤵
        PID:3436

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads