Analysis

  • max time kernel
    91s
  • max time network
    143s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    26-03-2021 17:12

General

  • Target

    open.aspx.gif

  • Size

    43B

  • MD5

    ebd4c7248ac9be0c41d02060e3430a5d

  • SHA1

    eabc59bee6a7ff007a1dfc3da3b5493143c0d087

  • SHA256

    e1da5cd02d74bb5ba944e3ce44037860ac9f42392eec6c99b9543910e1a3a5fe

  • SHA512

    0f3b6529892aff05bbddc7614faca83f3651f4b14c107853d2cd502391c35f5e26a41af31b5503d68c77264cda24f616aa9f9655fe8a79e975090365ac38ea71

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 49 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\open.aspx.gif
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4688
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4688 CREDAT:82945 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:4948

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    MD5

    8f1360443d854116c6e404bfa8dd93b9

    SHA1

    635bee21d6c36874f60c4d7fb2f5241865dce18c

    SHA256

    85fce54bc37deddd866a904a4c7cd06a6a36db34691c73ddb4b39a2b3181d91f

    SHA512

    e1a345adf26b3b86508c399c09b3e210aaa8a3e7f43fb218666f5e2eec380d28b7818a70c1a4a72b7148cd2f3a86203ca51ffc07a89ba32388e15399e46c81f2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    MD5

    a6f47e9d64a54446d585c05a049acc75

    SHA1

    666682557a60afd20ab9aaa7a86285bc84fab8b4

    SHA256

    6028a90e043e3a6dbe34cae4195e2ae7c2e370689e8b31129f8ed5d0069fc3b3

    SHA512

    824b18be3dce0c207a42e32c20d5d4ce480ba74fece2b9d48a23411b289b11ba273e09af8ffc00e22018abfb0c62423d86b62cf785cc163d64ab8fc02a6443f2

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\5TFMVP9D.cookie

    MD5

    f218a98fee823bbc2ec921fe9fb5e430

    SHA1

    b8df3a077645101c7ca4fc50f4b6769388b335ac

    SHA256

    e3c6b916008d4e8fef973fe604f7fbbb360be3e945ead4d8b08a2da9252333d3

    SHA512

    cb84a7f6f432185ef1910bb7407b7eb903e66d967e97e06edbc8447d922aa19d18fea706a2fb25b36551d0884b7ee2067d0ff021fbaff2c010f28edf1bbb5933

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\AV4QG2Z0.cookie

    MD5

    3cee94634a02edeeb5098f3bbfbb9158

    SHA1

    a5439019c6bd1a843b0d5eedc3a8a7666295127d

    SHA256

    50bcc6cb0c7b3102ce6cee712237534e77b32817b5edc9acdc65ab57366c33cc

    SHA512

    58d706bf104053d7113fde34d372f49a80790ab8669e42e6c002ccf25995c4a54319e1184f4ab81c81084e76f35773b635ee277b02de396d60a370bc457297f3

  • memory/4948-2-0x0000000000000000-mapping.dmp