Analysis

  • max time kernel
    126s
  • max time network
    176s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    30-08-2021 06:15

General

  • Target

    js/plugins/revolution/css/closedhand.html

  • Size

    326B

  • MD5

    a8c874b93b3d848f39a71260c57e3863

  • SHA1

    afdc1b09a85db2acc84e029007277ed62c730624

  • SHA256

    d367ee0a4c16c7cebfdbf92c97a72ff63878e7f8be176ac8c5ede75a2265ec52

  • SHA512

    3a82e87bd50b0c713dad893204e05f311595b7707f2e431f6f0cf3639d5c9048cc7beb93f11fb977dfcb95786afae64b8139dc016ad2fa12de629b8f72188f19

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\js\plugins\revolution\css\closedhand.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1924
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1924 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1712

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\GFKXM9DX.txt
    MD5

    21f843e31e8577728ca989913d3e3703

    SHA1

    92fce4bd330a77899fd6dd7240ff5909f5e670d0

    SHA256

    1db6b089719c6595bf8f3c7c6364a18db670930c25ae1753def19504a80090aa

    SHA512

    d1d4367d5f50275b204862f40ed18c59283d8c127fead178a9f682062d9e930b9296cad283f5ded85cf2739ef422f56698caee8e6f7365b536b3036949ef1a5c

  • memory/1712-60-0x0000000000000000-mapping.dmp