Analysis

  • max time kernel
    139s
  • max time network
    168s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31/12/2023, 03:01

General

  • Target

    258a395faac5da41d69779fd12be88be.html

  • Size

    591KB

  • MD5

    258a395faac5da41d69779fd12be88be

  • SHA1

    b76e8fe354dc6f40df45c047815d08c891881cff

  • SHA256

    5138aa80bfbe4e2c160149489fd8a4c53ce94e52586c5e9507cc33a4bfef8cb2

  • SHA512

    d3f3f980ef3766a8a4bbe91b1454a405c1a69149a5e9c3fe713b8f31b7541ca817e33c696ea9eda718831f47062d07e8b03645cbaa902e41dae30203ef126f8e

  • SSDEEP

    1536:NsPuhuTFpcW/e9Ch+sMIJU2GgT7Ost27B3SXzHKkflAJGyx4R/7h+hFyiiLIG4qo:NsPuhuTFpsz

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 21 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\258a395faac5da41d69779fd12be88be.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4976
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4976 CREDAT:17410 /prefetch:2
      2⤵
        PID:4820

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads