Analysis

  • max time kernel
    0s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31/12/2023, 06:48

General

  • Target

    2c323f8060297f9f6140b593f9072d67.html

  • Size

    12KB

  • MD5

    2c323f8060297f9f6140b593f9072d67

  • SHA1

    1cce0f869a1defb8b949c53c519189dac10e52be

  • SHA256

    30fb23a17b652869ce2ae32b89fe0a5264939d517a1c352fcda6b3e564ea7997

  • SHA512

    ca701baff7b818985927426bda2a82303a887ddb455ef08a0a364a23eecac77d15d24da21a455083025d230453f9a165d8ba420249e12f79746a1a331d13fda0

  • SSDEEP

    384:pt8n0nC/SoWKt7vJX21U95kMg/hsGxGY+A:P82oWKt7vJ21U95kz/uGoYL

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 6 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2c323f8060297f9f6140b593f9072d67.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1532
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1532 CREDAT:17410 /prefetch:2
      2⤵
        PID:3232

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads