Analysis

  • max time kernel
    0s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    06-01-2024 02:57

General

  • Target

    4518946c7ff1910fe971e287e7dea492.html

  • Size

    6KB

  • MD5

    4518946c7ff1910fe971e287e7dea492

  • SHA1

    0dc3e7cbd7e2a6c8d2f04773b0e925aa41aa45d3

  • SHA256

    71ce02f1d0d34450d0b6675d961b7b35fa06e3c2c7b680869ce156b5a78cd493

  • SHA512

    1f4d6b060e6cec1da8e23fbc859e5866ed6bd0bc15834e7fc1a24a2a1c6345e7382ff0ed0770d6eb95dd8dc88c59b5d2ac997854d353c63862e6e5d9925af227

  • SSDEEP

    96:OVvXr5k9ZBDZU4ci0w9iFcFbv3XXr5k9ZBDZU4ewWVTaTxXr5k9ZBDZU4cS/+xX7:OVlS0FcxtS8VTaTrSSSYxeCZKAIS

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 18 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4518946c7ff1910fe971e287e7dea492.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2256
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2256 CREDAT:275457 /prefetch:2
      2⤵
        PID:2064

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads