Analysis

  • max time kernel
    145s
  • max time network
    173s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/01/2024, 21:38

General

  • Target

    447f17c7d684114e9a625fd314361209.html

  • Size

    42KB

  • MD5

    447f17c7d684114e9a625fd314361209

  • SHA1

    b1d45d3dedc77876d544123b5da0b005af26c800

  • SHA256

    ae2c713b380ddd50715161255d4521ed164656f3820a3d43192a4f9be113ba02

  • SHA512

    028df5c829b9428d3e96af5af1161e232f41e8e510a1afc3d29543023e66daf902c80bb7668896ba48d1ce711cbbb7b8b64aa2973fbd8113113e033ba095695c

  • SSDEEP

    384:iiFOuNsu+Xso4fS6oHrks/L0ZJcz9ZmbnwZxdsQ3jK44qXAKWuaaULaUjP82SKdj:ViAS6ogJi9ZmboxdsQ3rMdxg2SKJ

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 21 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\447f17c7d684114e9a625fd314361209.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2652
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2652 CREDAT:17410 /prefetch:2
      2⤵
        PID:3444

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads