Analysis

  • max time kernel
    140s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/01/2024, 01:20

General

  • Target

    4f347fd47fb5f0341a70aca00571ee21.html

  • Size

    49KB

  • MD5

    4f347fd47fb5f0341a70aca00571ee21

  • SHA1

    8472e764f2390b9c19e165cb2dfbfca58f673676

  • SHA256

    e2e2456ba34f0b0c9c62bf2f92ad9dd0c730bfcde56374f378cd6229bf2da464

  • SHA512

    0fcb5817c9504070a860a5abc074835fcdefa520db04370ba612f2c2d544ee2be37ebc0c9b5ffe17c0b04727c613660fd3c50a6fd59b7abeb7f55c1cc4ff8407

  • SSDEEP

    768:artuYPFI5z05u4V2MsyEE+A2hWCzPIP0kNG5LrMhqJcjQeVeWJc:axuGe05u4VFSwPy5L05ceVeWJc

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 15 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4f347fd47fb5f0341a70aca00571ee21.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2164
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2164 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      PID:2344

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads