Analysis

  • max time kernel
    135s
  • max time network
    143s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    13-03-2021 11:34

General

  • Target

    btob.10.gif

  • Size

    43B

  • MD5

    ad4b0f606e0f8465bc4c4c170b37e1a3

  • SHA1

    50b30fd5f87c85fe5cba2635cb83316ca71250d7

  • SHA256

    cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

  • SHA512

    ebfe0c0df4bcc167d5cb6ebdd379f9083df62bef63a23818e1c6adf0f64b65467ea58b7cd4d03cf0a1b1a2b07fb7b969bf35f25f1f8538cc65cf3eebdf8a0910

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 49 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\btob.10.gif
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:880
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:880 CREDAT:82945 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2896

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    MD5

    97c3452d30e30fa651c4b2886a4cc626

    SHA1

    a4fce689ddee7e0e8028029f04b554d3d6833c40

    SHA256

    a5d996c2e82373bae0067dfda761706be6dbf7498fa6594937e948ea2023e155

    SHA512

    be6e975f32d94934b9bd2ff1b6211d78c050ee54ea968263ffd92f1cffd159ac38be87a0e7a9bcb7add827738a54a9212fea9f5026372d453f1e251f5e1ff2e0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    MD5

    ab182d284e983e1bf703ca64c32cdf1f

    SHA1

    3f267117c2cfd599fb15751fb371a0c62bc7d3c0

    SHA256

    33ec241ee90ef17d59ea2d104efbb3a06e85ef238cee80ff4ca84f454c0c82e1

    SHA512

    4d872a42c6be9c2524606ef782a70cf993970744b2773f4c21bef13324ffc04e9bc4c35b95590080223d31abc8f33bd9834e3aeff7f0039291d99f578bffcc36

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\57NEWKTK.cookie
    MD5

    9ab9467bbbdee9acca9c041de4ae019f

    SHA1

    20a3bf3a9c1cf5e6acf35da622e216af2a32f7dc

    SHA256

    62e68f63fea417f61bb54e7716edad6c54d7fc04b3505cca476c8f9bfb755810

    SHA512

    aa4d2ab2064e10a2a9885680f78d80f04d5efe1879144f0a20c4db39a97b723e6fc8d5e8756aa6d2cba8c53f4854e85f55c98b61e7c6905b6a6429b50f14aff7

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\SXTNOZCQ.cookie
    MD5

    602f023e229d0884c12e8503a154de1a

    SHA1

    a4146e6035f782092e506cda08771c6dc126f7df

    SHA256

    bc72221bd95797590369e7d5ea154656d6711ba902812191804c42d11f3e5389

    SHA512

    c0eb2e0b0cd807886d1d56f8288775ef180810ef2138173c357f615858ef20faeff0333cb7e54052ed12ede490197ebc49c12ed076f74021ba596f57eee144c8

  • memory/2896-2-0x0000000000000000-mapping.dmp