Analysis

  • max time kernel
    118s
  • max time network
    141s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    10-03-2021 03:31

General

  • Target

    btob.10.gif

  • Size

    43B

  • MD5

    ad4b0f606e0f8465bc4c4c170b37e1a3

  • SHA1

    50b30fd5f87c85fe5cba2635cb83316ca71250d7

  • SHA256

    cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

  • SHA512

    ebfe0c0df4bcc167d5cb6ebdd379f9083df62bef63a23818e1c6adf0f64b65467ea58b7cd4d03cf0a1b1a2b07fb7b969bf35f25f1f8538cc65cf3eebdf8a0910

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 49 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\btob.10.gif
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:828
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:828 CREDAT:82945 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:4016

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    MD5

    b2b3a0c470639ca5daadc9fe5f37db95

    SHA1

    9d979d4db41b766a2f0febc89ccfa7b50d0ae44d

    SHA256

    bdec475d76d3a2c297aec33a53d1e66cb6f324856bf2205f4ec2e2e3a50ae9ad

    SHA512

    a8e6bf82dec31d2e953d1ed9c883d88cb91b5a134a96887883a88b7c81eeb3bc0f1728d0cc82f37a603d320ff1428131e10983186318dd46cd1aded4d9b81193

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    MD5

    e98fe51085b05b2bbb90c251bbe39856

    SHA1

    39f3fe4f783d9ba112186a99197176dee093bdff

    SHA256

    fa48d20cb7d40cbffe3219004568d1e815238d35aa69f0a9c61cc05952202651

    SHA512

    7bb39339bf383e168ef17a54afdddadaf56e698ec879e4212be623aceea6ef7c5e9ac324dabfa14cd781cadcf629cd14844ec8232cd660f8c4d0f7bcf83c2148

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\E86L6BP1.cookie
    MD5

    fe939ea1f3cc23e7de636cbcd9c3cd81

    SHA1

    16d1c379a4d0876e04e28f7f468ea6a38587085d

    SHA256

    5f68b123593c4024103b95f2a157d9760c092e3920cd68f679b70795582cc371

    SHA512

    2ddbc0433bf273edf16512dda427596122c45b98266798e06f2711f94e6de881d33cf139f29c67e1a2a9c2b92f71ad9964f03f81b3467f4c55236760f7b52c5c

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\HP6TAPVE.cookie
    MD5

    1594630e67e666df09048e97377895c0

    SHA1

    c8eba67ec3887b22d6d92f72fe44f176984240da

    SHA256

    e335feb997602f44d478efb038126f6b025dd1117c77a8c0fa8090103b5ce66a

    SHA512

    ba31854c24f151eeaea87225e0d80861187f4e738f1011e733d2808f0172185d04da3db3e314ff5a7862e5be73fe739fa811cc754449fecd1f84613c24a673e3

  • memory/4016-2-0x0000000000000000-mapping.dmp