Analysis

  • max time kernel
    304s
  • max time network
    1002s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    23-07-2021 09:33

General

  • Target

    Win32.Pegasus/Pegasus/web-adminpart/res/index.html

  • Size

    6KB

  • MD5

    b2bca01c0889dc77378fc6dce84f6923

  • SHA1

    fbcb68071316ab6d4da5b662a17c952f24d12fd8

  • SHA256

    00b2eca7d1302e6f12877bc6237f2eacdd876394ad875573ca518dae802f6127

  • SHA512

    604f96513870454cff37f523a8f0b9358f33aee001d8437f84bb198b80ca3d3767cacdddb595762c56438f343d6987eea3548dbc63cfc9c19438ede34f4eace8

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 49 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\Win32.Pegasus\Pegasus\web-adminpart\res\index.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:492
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:492 CREDAT:82945 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1636

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    MD5

    cd54147c202c58ba558d363be8280eb4

    SHA1

    5f8bfcd8e9d9c3aa615657452fe803400391f3c7

    SHA256

    79dc4932101b6cb5e93bf0ff468e72dd7d3625d3c3e67c5717f0ee283f37a710

    SHA512

    afe4b2c8a4fad89e3135d263c663c559f341b17b85e5de2210923274c3596c83dee5a93914d3e45ef3de15d3bf0cdd71186188423df7c0eca49bbb28fde2e0a0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    MD5

    b84a088f30e902d1386b0b45f906c414

    SHA1

    96bc7634b3a63f7532189cab5f876aae1818909c

    SHA256

    95c8bcc5e018a7b117dda7765ee46d06a0753ad4db2226ccf3faec0ecae1bb4d

    SHA512

    f99a79867bb395244e3071183670975340f8fe3b5022051f362e83134f633a4dc9f090f87232f1c2ee4fdcb80d7f884772005e7ec4d15247c2a056fe231abdb1

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\6GHTJQDS.cookie
    MD5

    180d9a623714448f273af61104cf8945

    SHA1

    dba9aed43715700af623a7608b2cdabf272537c6

    SHA256

    a501a2fdccf3f7623d2dacf9b3af233131d2badee5d73aea1883071bd35cae5a

    SHA512

    cd3b83478a2b54427df87a50dcc65d41fdccbb7dcb7a06b212e5388d17ccdd39af08dd3e06e6b30144788d41bb6b87e73abf1d5e5fa40311f740e8b31ac6bef3

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\BJMUWUSC.cookie
    MD5

    ec30720b1b52135278891fc02bc23133

    SHA1

    4abf1bec00fd60bf412258f7ecf68e060c14ed76

    SHA256

    b42ad2549554b5c19eeb72fc226a451d9b76feb9666ae90980ee8bebd6f37f8f

    SHA512

    71915156fb09ad40226a967502ddaa5711b21802f545af9c03995f046498a78f6287f28790f4c4b8f58d076dcd52e57f3d05b9b481627c5044d56b07cc3491dc

  • memory/492-114-0x00007FF9860D0000-0x00007FF98613B000-memory.dmp
    Filesize

    428KB

  • memory/1636-115-0x0000000000000000-mapping.dmp