Analysis

  • max time kernel
    130s
  • max time network
    173s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-12-2023 07:11

General

  • Target

    5bb893f095a4abbd2988a877e98eae85.html

  • Size

    56KB

  • MD5

    5bb893f095a4abbd2988a877e98eae85

  • SHA1

    915294630845a561f0ee71ba5c13c811d5d33fd9

  • SHA256

    30a5c9f8d1969406a2e0c926ae32fbd25b1f4e42036ee2988b9b5bcea1338495

  • SHA512

    d67bf9bab7d8251dc4a748cd175540e7828c9d49cece7618e88e24b69c17353a5f92beaf716e26384ca2146a264dae1f1887c39cc0b87b670cebffc36409df3c

  • SSDEEP

    1536:S1I9fAT3Sd/4LwL1zj41xRq6uNaaQi04REyGKifyCnWpH0BIzRxUMFV4Ujukp74v:S1I9YT3Sd/4LwL1zj41xRq6uNaaQi040

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 15 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5bb893f095a4abbd2988a877e98eae85.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2080
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2080 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      PID:1400

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads