Analysis

  • max time kernel
    0s
  • max time network
    120s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-12-2023 12:08

General

  • Target

    6d398823c97b179eec9d8b0829710377.html

  • Size

    24KB

  • MD5

    6d398823c97b179eec9d8b0829710377

  • SHA1

    a5c8a937d1af1652420fb8684c9bcf00dcd9ed6a

  • SHA256

    1583f9492e40e8437daad7660b8f3137d0aa14401980418e90236fabb4304eb6

  • SHA512

    54a6fce887003b9ceb8be81511ac3c5c054bbaf829ff50fdece34dabdfd74998822d04dd4d0a695a2c457cc099c4f5ec239861b4e952cb82183af5704275bcca

  • SSDEEP

    384:SImCsxHYF/sDn6iGpfQmHwuOCJVoTwozP37H:ST5pbOzuy7O8odjrH

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 6 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6d398823c97b179eec9d8b0829710377.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3680
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3680 CREDAT:17410 /prefetch:2
      2⤵
        PID:2896

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads