Analysis

  • max time kernel
    317s
  • max time network
    367s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    22-11-2020 06:28

General

  • Target

    index2.html

  • Size

    6KB

  • MD5

    a81d96c7ec17e2508e1516ced7f8d52a

  • SHA1

    88ecb602f5badab8cda2ba2307c74eae9532b411

  • SHA256

    9ac684e2d75d94e79155f364c62af51055c2475fe9f9672b302aa9bd4651d695

  • SHA512

    7d22f5530fa4c810e892f4de84a563979664f97e70fd2a8b42ad9fb5581247f05e8529cda617af7cee26fd3d9d78498795bc745569b04c626b3500b84a6e3ffe

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 49 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\index2.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3576
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3576 CREDAT:82945 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2752

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_D9817BD5013875AD517DA73475345203
    MD5

    ffc04cd305e33221116feebf2eaa50b0

    SHA1

    6aeecd1a32ce6655a43e6b35cb2d0cb45876c9d4

    SHA256

    e0215011ac1136f278389a2a9b9572d9cdbb704f4a2a6d4b9cb8e99eba316de4

    SHA512

    ecd09a4db7f337f7b4b767edca0615262af8785c3dd85e6369037c04eda0865c59949a406e6e016ba8e893e7f740881be22909aa472ea6fd1c38aa3902979a01

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_D9817BD5013875AD517DA73475345203
    MD5

    0982ab39903fc2132b7ca9f8bfb96e67

    SHA1

    c3cd04ac6933629a329eb9f2f2dca72a1af7ff7f

    SHA256

    6ae2e230b6645e8f3b226c9c8342ddfa962f457bd39c848e9ae65570656a226a

    SHA512

    ddb6cf0e51b126630aa0cf74d24d5b23ae0c688c3fa8e75de39e52ecc83ac5b74d76428bd678286f7b1ba83174fa4ae7df2b6f958da89c93b27478f8c578fcc8

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\0PJFGSOO.cookie
    MD5

    331a32c86bbe90a296f9df6c6514f95d

    SHA1

    1e7b44a6c9672f5c74c5847f5ad36ebe06183c54

    SHA256

    8e414f3a48225f7739f063277dca370290c7fe09582d3e50e60e29948034de4a

    SHA512

    efab2fddf3747faa2d0346fc8880a97198b42894d88039a9c9a8b49245015399ab48eefd6baecab163a18b5fc984aed57c2fa3e301fc00c1d39e5da759629661

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\JTPRUIXH.cookie
    MD5

    d098cda98555b433e49ab6c0a85eca07

    SHA1

    4f5349aeb1b98f123afd6a75295f4862f7030e6e

    SHA256

    6b8eb17ac511af77240fb0802715f6c6e46fcfac37a2b4c9624ca388c8eceff8

    SHA512

    d8bb2ba8fb7fa671b632d424ef69c837a80a235e4257078b8e62101c384c5d1a49687e066ee10287dbf425fe1ddd92124a496e320c3f6b7072c4de34e8320a52

  • memory/2752-0-0x0000000000000000-mapping.dmp