Analysis

  • max time kernel
    135s
  • max time network
    172s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/01/2024, 16:24

General

  • Target

    3e74c7bc12aa2a4a24c321fe1bb73d64.html

  • Size

    45KB

  • MD5

    3e74c7bc12aa2a4a24c321fe1bb73d64

  • SHA1

    e129fc4bba0382f374a01302a738df369cd95973

  • SHA256

    4e040a769a3f625c95040b083106b4193f1abbe2a678da862a4d30349a58b95a

  • SHA512

    a32a73dbd6e6e6cc49f33d4033a7973893651bab96431f07367a201d9cd5308ca6cce4f44fae6c6df2f0e0d870f7c90d2859adf595e5f94bdf81e2b1a2ab07b7

  • SSDEEP

    384:hxDtInvx/wo7q6Bpk30OT6p22IO+lyO78VO034snOFjA4xU20paN0CzWMnJ0CUks:hx0vx/zG0ONjA4xUtw0CzP0CRXaU8nT

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 21 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3e74c7bc12aa2a4a24c321fe1bb73d64.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1444
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1444 CREDAT:17410 /prefetch:2
      2⤵
        PID:2520

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads