Analysis

  • max time kernel
    0s
  • max time network
    138s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-12-2023 17:03

General

  • Target

    7ecebd9c806edc3908c1455d1a6b1b54.html

  • Size

    10KB

  • MD5

    7ecebd9c806edc3908c1455d1a6b1b54

  • SHA1

    76fdf128a21169749dd66a484c4ed7e51214e517

  • SHA256

    e76c4c9f9c847e86747a4471882716e7c725e229238146a096a1335ea00f6c13

  • SHA512

    899e1b822e17e25c2bc143f46f3abe4e6bfc1844eb5b1e26bbd3a00a411b006383a0789723d98047cf2d6dca3fae05f074f82bc02f3c47eaf65a64e25d9efcdb

  • SSDEEP

    192:2V1lIsr03+D8k/w1wvqVkZXBxnrn0xfMX013auBuLbdU8d:s1lIcu+V/gYXBxnrn0xfMX03aguLZ

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 6 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7ecebd9c806edc3908c1455d1a6b1b54.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:348
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:348 CREDAT:17410 /prefetch:2
      2⤵
        PID:3152

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads