Analysis

  • max time kernel
    0s
  • max time network
    66s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31/12/2023, 04:13

General

  • Target

    27b8bbc6f1fd772c5bbe9bf80d3fd1b5.html

  • Size

    18KB

  • MD5

    27b8bbc6f1fd772c5bbe9bf80d3fd1b5

  • SHA1

    3ba524170a7e7db8481f1e89d1eb9af6d6fc65af

  • SHA256

    0d0b1815bb8780a35ede4c06836e4daaf104c66733dda07dcc9bd1c11fb6de90

  • SHA512

    578d8de8fbbbf6e7ad9fb3dc1a176596badb1cc4229ed44b992b14e66a4a9376617f26a28eb036b040dbe8f982e5c3c70dfdf0928f3643f623b5dc15d1421ae3

  • SSDEEP

    384:0nz1vQNsahr1AgdGgs8jMaztTLPAuz68MMv07e:AzK6K1AgdGgs8jJO8ts7e

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 6 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\27b8bbc6f1fd772c5bbe9bf80d3fd1b5.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2876
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2876 CREDAT:17410 /prefetch:2
      2⤵
        PID:1964

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads