Analysis

  • max time kernel
    0s
  • max time network
    113s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/12/2023, 08:49

General

  • Target

    611ce4df35ec5ff400f1a50b7b1de533.html

  • Size

    29KB

  • MD5

    611ce4df35ec5ff400f1a50b7b1de533

  • SHA1

    64cf371d33b6252b5db0b96e4102778af2833dfa

  • SHA256

    98be1baa2d5b0db636f173637d0e1a140cb45bd249fe50cc794be53a5bbda29a

  • SHA512

    fba0048d34d3d6721b21d8fa04af9504bd5e88d94ecf8a5540a2274c9373be1376a8a865117431121337a2b92eef9a9e83e0eb27501f4bb04c947ff460aceb28

  • SSDEEP

    192:aoZwwPf1tsziprq1e1/CbnYCP9UZAf2UcAVU7AnUod2zj6EuimCItt40fZ9c+uZ3:bYipXGRqc5uFFshS4A22UG

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 6 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\611ce4df35ec5ff400f1a50b7b1de533.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2080
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2080 CREDAT:17410 /prefetch:2
      2⤵
        PID:1384
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2080 CREDAT:82950 /prefetch:2
        2⤵
          PID:548

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads