Analysis

  • max time kernel
    394s
  • max time network
    379s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    22-11-2020 06:28

General

  • Target

    index(2).html

  • Size

    6KB

  • MD5

    6ab776dc484b17397ad580be04b00a54

  • SHA1

    f3058f8c46c45af5baa46ee09dd3979c100fffe7

  • SHA256

    e8be9982165aa8f2b44c3bc3ac6fce1faa03266fee0a0a223433e18f18cc60cc

  • SHA512

    8259e1848fabcd0dcbe114021d1033faf766607f1955e9bd5f5b70c791bb8b2347db73dfd7672ea3c68ff490674b971424cbc5ea5bc77b243f2ed59ae22e2f6d

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 49 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\index(2).html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3108
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3108 CREDAT:82945 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2216

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_D9817BD5013875AD517DA73475345203
    MD5

    4fd1154dbee8bda008d2a2ff53240855

    SHA1

    29913132808f93bb89583082786ca080b6609a1f

    SHA256

    f0643a2bc9668f5378bb84f7302b925073d18374648e1d33624c88c149b9370d

    SHA512

    62739cb9df68299ee11ebbbcded36a7cc821d8a3b08e1fa0e84969340338e904feb320079e0dc10a8cd3fce33ffbe21dff569333a801aa8edbf776fb4285b235

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_D9817BD5013875AD517DA73475345203
    MD5

    5600ba092df48e598ded7a5f86a9e28d

    SHA1

    0a7fe3912ad17d60d1ee6999def6bd16e332f289

    SHA256

    9ddfac214335f353d064553153edda4ccf22571c2b25ef66859b4513191dd700

    SHA512

    3aeeef623bc9d00bb99a889b19734846bdd0caa8c373a4878663062f7eeafe7f3f87429437171fdda814b4caa4ea537a2531c9d8e55fc977460283d38bf5db5b

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\B1XTJKR3.cookie
    MD5

    b544f0d250b263b239013dcef7bf12c5

    SHA1

    df11c6618f7178b455b7fa1823e1d17f85eb2a02

    SHA256

    7d6b3199d4e513c31e0c7bfebb3033e25d9a982d808bc86f3fe8891e34b1e05f

    SHA512

    e30e16792ab52c240eef4cbcf4da011e6a22e02861fd46bc8debdf1961f74050b2fcaf8adad9189792498c7cc27f91bd02cd930f793597101e0d1110ae202bba

  • memory/2216-0-0x0000000000000000-mapping.dmp