Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    12-03-2021 19:39

General

  • Target

    btob.10.gif

  • Size

    43B

  • MD5

    ad4b0f606e0f8465bc4c4c170b37e1a3

  • SHA1

    50b30fd5f87c85fe5cba2635cb83316ca71250d7

  • SHA256

    cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

  • SHA512

    ebfe0c0df4bcc167d5cb6ebdd379f9083df62bef63a23818e1c6adf0f64b65467ea58b7cd4d03cf0a1b1a2b07fb7b969bf35f25f1f8538cc65cf3eebdf8a0910

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 49 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\btob.10.gif
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3576
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3576 CREDAT:82945 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:3924

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    MD5

    e982b91c7ac1f260241954cdc5092a58

    SHA1

    16686d39baf0fe718921842c0dbae39fec9533b3

    SHA256

    71834062cb30b9973b5d8796f3686f260a4a5a8d5f42b4c5107668c3a6e66546

    SHA512

    808beaa9d0a0875282fa5248927226d63bdd86ac27d722590a4620d2a34833165d4b5c2472641f08232f4c35b90f2330074378d891de7fc9e05af043a4b4e621

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    MD5

    6841fd17e2fc36f82f6cd9780bf66872

    SHA1

    2f24f7a1c45bca9ff20838464aba55335831fc6f

    SHA256

    491be587689750a665f165b8dfbd305274abd8a50523109fb5ab1d0e1128f245

    SHA512

    570f28884c335ab0752033255404c3ca6e5a2a1179fb226b26ab10fe1b14be775a0283f35c7a341c1fdd76f655999ec57814461e612e4faa1bfb9155786ad916

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\7QJSPO70.cookie
    MD5

    0fd94cdf2fbfa80a0bbb39bc6e314382

    SHA1

    7c872781188726e4dd5ff1712481ed164531fd1c

    SHA256

    f6089d0917deed27e52db9d2f44b326916eca710ffed3e03acd49066f974a6ad

    SHA512

    30722d26010505344edb90b8f178a3b5825fb32eb61f702563fe7d7b9e9cf90f66e3ad3370facaa814fec96281287a0d3b09dd85b793bd4acd7d9a1862319081

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\HA1TSM7R.cookie
    MD5

    06fff375f6669e2afe8589a0b4c670bc

    SHA1

    e200d6f858cb32322b4dfdcbdac4a59a6ca208b1

    SHA256

    9a56a1b5af2e8ac7c67a70f13f61cfc25ae39e858f4f11984ec3f0083c65a8b6

    SHA512

    80a566cfcb7bcdba9ceb5d3f11b82458354d5efa2d86fad0a7f482d434de0c60236b8176465abf92b000a0bf8f02117ea65fdef09529e9ad5f522ef15deb4988

  • memory/3924-2-0x0000000000000000-mapping.dmp