Analysis

  • max time kernel
    144s
  • max time network
    170s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-12-2023 14:41

General

  • Target

    765fe14a18b2ee8960054e42271fbdb0.html

  • Size

    11KB

  • MD5

    765fe14a18b2ee8960054e42271fbdb0

  • SHA1

    05c9f818a1d62a00aeb43b4252600a3bc3aac134

  • SHA256

    e95370de92fc5c49725dd6a7c19db449802c8b27f4ee160c1014f7a632c68cff

  • SHA512

    dc6cf708192ed3984beb3f3b99580c4a05dba6e114a1e3dd6b6a853cc7f5ba3a69dcfac058de7b4bad7b75339d8703605d44e51bed6d4c22e4a4a2bab68bd0b4

  • SSDEEP

    192:2V5lIsr03q/8k/w1wvqyDBNbrnwdrIT01fRLOXuBuLbdU8d:s5lIcuqZ/gcDBNbrnwdrIT0ZLOXguLZ

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 21 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\765fe14a18b2ee8960054e42271fbdb0.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4752
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4752 CREDAT:17410 /prefetch:2
      2⤵
        PID:3256

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads