Analysis

  • max time kernel
    0s
  • max time network
    109s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/12/2023, 20:47

General

  • Target

    f716c16274775cafb0988e85dfa21c53.html

  • Size

    9KB

  • MD5

    f716c16274775cafb0988e85dfa21c53

  • SHA1

    cf172f082b1ac6f0d62e2a1e7f7c72fd5c83996d

  • SHA256

    eb0bf32e7048a816cac0dea7241d87545891dc1dac5e6916a3d3c6d2d36954c5

  • SHA512

    d3a5f894195190da105bde84917ecf6b7bd25555cd72f88e4e76ecc2a7ee124edaffa103daf88235ab3b6e65b0af3c78ef5128981c3f888dbc2fc4b8db9a70c9

  • SSDEEP

    192:spQoKWCQ5aDMXZo40Um9Af2m9GJLOhm9ycdWPm9GYm9LgnJ:sVlnLf2+hjCCc

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 6 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f716c16274775cafb0988e85dfa21c53.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1536
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1536 CREDAT:17410 /prefetch:2
      2⤵
        PID:112

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads