Analysis

  • max time kernel
    118s
  • max time network
    139s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    14-12-2020 14:28

General

  • Target

    4785d3a3efa5e29793049412371587d5.exe

  • Size

    375KB

  • MD5

    4785d3a3efa5e29793049412371587d5

  • SHA1

    025e645ac5beab6195ac18dcf45730d60afa8bdb

  • SHA256

    7a01b6f6c639d80933c7f60dbde344a1a12f20088af192b74c13c28d2810aed3

  • SHA512

    497624a931bbbcb02bef78a78aded48b417fd09dc2ed3e5fbfcdd6cdc76a708e41c3a1c52b2883c7e8db9b03f00be72d3a8172787452cb9dcf8523699bc59d19

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in System32 directory 5 IoCs
  • Modifies Internet Explorer settings 1 TTPs 42 IoCs
  • Modifies registry class 186 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4785d3a3efa5e29793049412371587d5.exe
    "C:\Users\Admin\AppData\Local\Temp\4785d3a3efa5e29793049412371587d5.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4632
    • C:\Program Files\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2196
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2196 CREDAT:82945 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:572

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Browser Extensions

1
T1176

Defense Evasion

Modify Registry

2
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    MD5

    1b4c9d3d647e5489e1d94e9309c7fda0

    SHA1

    578bd02d4c76aa8b01d6f4cc951d7012027e1de8

    SHA256

    df6c5ff85128a807b4fc40afa8d3a2f59ee9d0c3370e7fdedd601c3835afa557

    SHA512

    55970044c2bb71e232a1b573bda0939e64f4620dac41bb66a0dea19e5b10139a42985623bd69a7cc0d09b85bc7e6f6875620512d0d1bcd18b44a68f7a736677a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    MD5

    fbf1bfa311e71858cbb4a7c32bb89eda

    SHA1

    ac2b31ad2c6e43ee9dd2bf11e8c0243ecba66cf6

    SHA256

    3fa044c66a923dba82ea7539388b536e1c6e9c4b2bbeca82d6c53232f6299609

    SHA512

    02bbd31fde7166308b81c048456f16e6135d3cd77b98590b1b5b78400a767733c5b094cf13f70248db2a59581c3cde43496b3aa56f0e06979b97e1579b45b734

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\8PCZXBJT.cookie
    MD5

    b68133fb9566ad2bba019f78a6cfabd5

    SHA1

    ad6181e47b256326127130c5c5e1b0ddd10f4fbe

    SHA256

    06b659e429eda4527bd203af9983574eef3f47639d8c8933f35ce1753268074e

    SHA512

    52bc1af9eee2172267e724fb975fdd305d2a7aa36e873fb9558cbdd67c35a2de56743a13cf3cfc0f31d321e1786d233396604b979fd6d1b410db4584622cd98c

  • \Windows\SysWOW64\CBRun.bpl
    MD5

    45682678083ba2f948dd6517e1b5323b

    SHA1

    990c6cd98510d1d73d61bc652d2900894da0a319

    SHA256

    4a0d3d5680985b883446801a6e4b71d20abc643a5b8272a214defbf18843066c

    SHA512

    a81fb6ba09c0bec253d1c5580a27c188962293ef64a56f8ed08c7c1cf53da4579725b63266555768cc2a112688c0c46672dab33550675f9d9e9b7db7a357a92f

  • \Windows\SysWOW64\CBRun.bpl
    MD5

    45682678083ba2f948dd6517e1b5323b

    SHA1

    990c6cd98510d1d73d61bc652d2900894da0a319

    SHA256

    4a0d3d5680985b883446801a6e4b71d20abc643a5b8272a214defbf18843066c

    SHA512

    a81fb6ba09c0bec253d1c5580a27c188962293ef64a56f8ed08c7c1cf53da4579725b63266555768cc2a112688c0c46672dab33550675f9d9e9b7db7a357a92f

  • memory/572-10-0x0000000000000000-mapping.dmp
  • memory/2196-9-0x0000000000000000-mapping.dmp
  • memory/4632-2-0x0000000002250000-0x0000000002298000-memory.dmp
    Filesize

    288KB

  • memory/4632-5-0x0000000002610000-0x0000000002620000-memory.dmp
    Filesize

    64KB

  • memory/4632-6-0x00000000047B0000-0x000000000486A000-memory.dmp
    Filesize

    744KB

  • memory/4632-7-0x0000000002D20000-0x0000000002D41000-memory.dmp
    Filesize

    132KB