Analysis

  • max time kernel
    91s
  • max time network
    141s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    10-03-2021 19:41

General

  • Target

    btob.10.gif

  • Size

    43B

  • MD5

    ad4b0f606e0f8465bc4c4c170b37e1a3

  • SHA1

    50b30fd5f87c85fe5cba2635cb83316ca71250d7

  • SHA256

    cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

  • SHA512

    ebfe0c0df4bcc167d5cb6ebdd379f9083df62bef63a23818e1c6adf0f64b65467ea58b7cd4d03cf0a1b1a2b07fb7b969bf35f25f1f8538cc65cf3eebdf8a0910

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 49 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\btob.10.gif
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1176
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1176 CREDAT:82945 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:3908

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    MD5

    9c364bf8a0f6e43c4b8f6ba17ba53580

    SHA1

    9a4d3a93a1f0620fea084bbc2ccfd6134a43f9e2

    SHA256

    235804fea5a88c3350ed1cd4857c2950ac6e1b7586e6a23c130c0a06d2ac3f6a

    SHA512

    10f849127482f85d86e6b7a37e37ae5dd2110f1440aa47373d4feb34375c7a7df74b236f5bcf43bb454edf986203d032f79aabb20612079c52bd83c15551983e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    MD5

    8afb77249edea2d6a94e3c34ef47216b

    SHA1

    ff32fe0e6897d215f290a175fe727b13d0badcb7

    SHA256

    df6e2b249367867f18feb65970f4484f668c8e216afc59774adf212e9b478392

    SHA512

    e9b6396027db4b2da52a0dafdd6b684eef48c1de62d4e75b5e06bcc25498764e9e4ddf42a76af932234c3f7fc66bbe797c744d7e62ad282367916b5f20241866

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\B37ZHYAE.cookie
    MD5

    ce1428330186917b84cbdc99252b7234

    SHA1

    220917c116a9dcf30ec31489aad4b233e2af9cff

    SHA256

    639150bdaf4dbbc9bd824e3a116922b1d11e070027e1729cf1fb5e169de6ec66

    SHA512

    8eceb5035e39ced7d8db24f10d3d92ef59f6c02e8765a9ecc681760d2d194d10e06793fe93a4fdd582e17e09c61cf7dca9a94f0fb90a52e0114fe55b6dfbb2f2

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\C6YF1OS7.cookie
    MD5

    9006c8be2df036294dfb7268c2fb55ff

    SHA1

    37fb74b5f499ddf794302339987729dd397fd560

    SHA256

    c6a040d511566eef27fa3a317221871890ed951bf6cd767e0f1badbcca7180d1

    SHA512

    3a92e3d8f6c368a7c392eca348116196017b51cc0e0d2df814e1642cb7fa613b8c8b7b1a92337c2e14c182b81f6c60c3456e26cf57ec8c38b881bc1eddc0aaa6

  • memory/3908-2-0x0000000000000000-mapping.dmp