Analysis

  • max time kernel
    91s
  • max time network
    143s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    10-03-2021 11:38

General

  • Target

    btob.10.gif

  • Size

    43B

  • MD5

    ad4b0f606e0f8465bc4c4c170b37e1a3

  • SHA1

    50b30fd5f87c85fe5cba2635cb83316ca71250d7

  • SHA256

    cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

  • SHA512

    ebfe0c0df4bcc167d5cb6ebdd379f9083df62bef63a23818e1c6adf0f64b65467ea58b7cd4d03cf0a1b1a2b07fb7b969bf35f25f1f8538cc65cf3eebdf8a0910

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 49 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\btob.10.gif
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4012
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4012 CREDAT:82945 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:352

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    MD5

    9c364bf8a0f6e43c4b8f6ba17ba53580

    SHA1

    9a4d3a93a1f0620fea084bbc2ccfd6134a43f9e2

    SHA256

    235804fea5a88c3350ed1cd4857c2950ac6e1b7586e6a23c130c0a06d2ac3f6a

    SHA512

    10f849127482f85d86e6b7a37e37ae5dd2110f1440aa47373d4feb34375c7a7df74b236f5bcf43bb454edf986203d032f79aabb20612079c52bd83c15551983e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    MD5

    4d70516973fe33b005a16ae2fa0bc94d

    SHA1

    3f96a1b4faf61be6ebfbb1d4cf59e99d4046ba26

    SHA256

    c8f953d7ea867e6063b80e5f0555a95c04795fa06c49de6a6ad4308ffa6e81c7

    SHA512

    7072bf406cf32c2cc716d2509b223e95fe00df8bf1d961689b5365536fc3845e2869601f7aa70adeb8991a8a4659c1f3266df8492814232df4dd0b2ac5878c75

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\ITT4R8OM.cookie

    MD5

    1eb9ffdb8552f7f70a9debde013c8325

    SHA1

    797e103b15a52c4b6fd4e6c2078614a64f578aa1

    SHA256

    5a8eaccc0814dec25cce112100d2e58e991cf978a584b56622d6aa1bac2f659f

    SHA512

    eaca11b28fff02f3aadabde2b3802b5fa9be688902159bd5fb3abe01c236eba8c365bc9c91b0bd74bc5577c8991dd04018110f02145a90d968f83b1451c24bd0

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\W59152LJ.cookie

    MD5

    1e49536029ca6a0f2d61219995458f46

    SHA1

    0e0bd8fcdfdca1013ac63bbb44a3b6dfbc1c08f8

    SHA256

    cb01aaba7c8c8a0b2ab1cfb84953adc727881815baa79cc0f1353ae869f821c0

    SHA512

    9bd64847b38053bd76dc6941039a7c51b59b494fdaf516c7c04badb8dcad1b7bfdd166cce0520336a8d99247e5e8f58632c34f7f17d7ad6c096d6cc386bbfea2

  • memory/352-2-0x0000000000000000-mapping.dmp