Analysis

  • max time kernel
    0s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    08-01-2024 05:52

General

  • Target

    4a9c107966f68ae14c9616f6ced4d4d0.html

  • Size

    57KB

  • MD5

    4a9c107966f68ae14c9616f6ced4d4d0

  • SHA1

    e1713fb8a04b19f4fe880ab2cee64760474e5731

  • SHA256

    e35e95edc2e6c7e3b3ce092ad41c56f801c8a1c89a16575eba7a3b9cefc0117e

  • SHA512

    24403a37b65ff8f51bcf1cb9f98f3bb2249be5ee268e0244003b5da781d85405749d22bab7a8a280ae6602d230eb15b34efeed403e2bfc290a364fcc1abf082c

  • SSDEEP

    1536:ijEQvK8OPHdVAgo2vgyHJv0owbd6zKD6CDK2RVropJwpDK2RVy:ijnOPHdVo2vgyHJutDK2RVropJwpDK2m

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 18 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
    "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1672 CREDAT:275457 /prefetch:2
    1⤵
      PID:2280
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4a9c107966f68ae14c9616f6ced4d4d0.html
      1⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1672

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads