Analysis

  • max time kernel
    162s
  • max time network
    178s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/12/2023, 20:49

General

  • Target

    039cc44c77d3cbd7abc16086c69053d0.html

  • Size

    17KB

  • MD5

    039cc44c77d3cbd7abc16086c69053d0

  • SHA1

    71fd003e5c43ba8cced0e7aa79c29c93a84b2a01

  • SHA256

    208e8d945ccbfe2506b339235c6e1a99142c8513b86d8abb8ada1b9741141874

  • SHA512

    918031fa21e2a6823996fe78e85703a5c41c732027b4188f0dd824fee6c1cb01aa4dae5836e192b3e21da6d2282f5e690c95242e3112bdea914bef5176c79d7b

  • SSDEEP

    192:PjejSC/j2jQIjhj1jiDj7jIgjQjuoj5jNjruYzjSjKEjlGN+j2jajcjejqjIQjKX:RAIe8uoNKkdjy6MgxpJmD387R3ih

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 21 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\039cc44c77d3cbd7abc16086c69053d0.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2944
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2944 CREDAT:17410 /prefetch:2
      2⤵
        PID:1136

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads