Analysis

  • max time kernel
    187s
  • max time network
    200s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/12/2023, 09:02

General

  • Target

    1403a1ddb411fc5f469aeba137281f95.html

  • Size

    79KB

  • MD5

    1403a1ddb411fc5f469aeba137281f95

  • SHA1

    9714570e402216a2caddda3da52a8fe2effac0e2

  • SHA256

    17f9bc9cd75b6b6d6fa52e36432908bcb502eb9d3bcb62df211b5a6e93da47f9

  • SHA512

    9f7fe49e1fbdb2487fa4e527191629844d3c46661e08ce2fe60328f811c23965ba7f37d8b7f48f82e8693b13ab96577afd662fb22bdca1f047cd27f5facef93e

  • SSDEEP

    1536:ADJXAUeAJQJ1s5p+7bXR0j+YoeSel/epDb7pGCkgTqrHkyUqwlllS:mJzF5p+7bXad4Db7pLkgTqrEyUqwlllS

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 35 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1403a1ddb411fc5f469aeba137281f95.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2456
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2456 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:4500

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads