Analysis

  • max time kernel
    92s
  • max time network
    143s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    12-03-2021 11:35

General

  • Target

    btob.10.gif

  • Size

    43B

  • MD5

    ad4b0f606e0f8465bc4c4c170b37e1a3

  • SHA1

    50b30fd5f87c85fe5cba2635cb83316ca71250d7

  • SHA256

    cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

  • SHA512

    ebfe0c0df4bcc167d5cb6ebdd379f9083df62bef63a23818e1c6adf0f64b65467ea58b7cd4d03cf0a1b1a2b07fb7b969bf35f25f1f8538cc65cf3eebdf8a0910

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 49 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\btob.10.gif
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:416
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:416 CREDAT:82945 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2640

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    MD5

    e982b91c7ac1f260241954cdc5092a58

    SHA1

    16686d39baf0fe718921842c0dbae39fec9533b3

    SHA256

    71834062cb30b9973b5d8796f3686f260a4a5a8d5f42b4c5107668c3a6e66546

    SHA512

    808beaa9d0a0875282fa5248927226d63bdd86ac27d722590a4620d2a34833165d4b5c2472641f08232f4c35b90f2330074378d891de7fc9e05af043a4b4e621

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    MD5

    6ad5897b57518a21941faafdadd379f1

    SHA1

    746439a8fdac9f9449023a35a6e14300ee78184e

    SHA256

    e7573672ca575cb0785183649d58cb862c8b30d9ef14f66f8e6225cf3557c1d9

    SHA512

    4a387a12fa5d3997bb925c4435d16b01054367122fbc4d27cee5f78286c5070207e1da810fa3bbe7dbbb648e193d00cb25b27c15c038134f408d009a3f8f5cc3

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\HIM5FDPY.cookie
    MD5

    4defdf80afefae832423a87efb807157

    SHA1

    dd768325e8abd20b72429d4891aeb4ccb50abc25

    SHA256

    042322efdf032f9d13e0113ff5deaa88c4040aca8464d7cb2f5480dc9c254d11

    SHA512

    3723429db67e7c12acf1b72d7d718683d77c45a6f6a4da1bdd5d779b8d383114982013cadd49fb921d464b1b674231c92c8089723f5ec94038188bdb7e981ca6

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\XAYSSTD9.cookie
    MD5

    cef6e0011d196c9837ae492b8c5c44d9

    SHA1

    a46f66826676df886f9d6b84f32aac1ce5914b47

    SHA256

    fcf5dc4f48b56dccef25f74e5f206e84763e686b690021b9a9aa3fadd547e9fb

    SHA512

    1a4c929571af9316afcc99ff8f5a43b9f476fba36af6b7d256a64ee9c80ec5a76bdc5770ccedfe40eedd3760f85170716b94ee13e0f2d705e0b24161d60e3ee7

  • memory/2640-2-0x0000000000000000-mapping.dmp