Analysis

  • max time kernel
    135s
  • max time network
    162s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    30-08-2021 06:15

General

  • Target

    js/plugins/revolution/css/closedhand.html

  • Size

    326B

  • MD5

    a8c874b93b3d848f39a71260c57e3863

  • SHA1

    afdc1b09a85db2acc84e029007277ed62c730624

  • SHA256

    d367ee0a4c16c7cebfdbf92c97a72ff63878e7f8be176ac8c5ede75a2265ec52

  • SHA512

    3a82e87bd50b0c713dad893204e05f311595b7707f2e431f6f0cf3639d5c9048cc7beb93f11fb977dfcb95786afae64b8139dc016ad2fa12de629b8f72188f19

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 49 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\js\plugins\revolution\css\closedhand.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3260
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3260 CREDAT:82945 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1640

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    MD5

    fb9ed523ba700d7bd169da09f80f35cb

    SHA1

    52b48d4ab50a3d34f15054c485215ad78b84a020

    SHA256

    9ad885119fb1556ae1f94eeb9a78709bc300c956d5de41ec19a84cdbc0ac7411

    SHA512

    44f3cc19d96e765a719d89273f1f2ff3d26eea5a274af97e136764fe63c0aaf72b343c6e6ce271e49d167f8c875566259d9b12245c7b05f69bd3bc17dc624ad9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    MD5

    1b1ba992983e657549a6f401b17e327b

    SHA1

    b100b4046162ecf64f1c20bd5b709167d2f81051

    SHA256

    9fe224787cef5caa36e379c878a84fe53715c99518b8e3af346d4070add55bdd

    SHA512

    1f927e3b6802a68e1dc99716929e8d28876a367e72696f7d71c367efbf221465d824764dfd71321d94b11bdd9a9573ce76c188b6759f86ee4c0adaea94a86d97

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\A31AJMB1.cookie
    MD5

    e6e29324466471f35d1e3a9e0235ffad

    SHA1

    3dd2a333e7aa20848de2b89487492dc128bbf33b

    SHA256

    731819b0310658f699af7c5e70538af3b3d434b9c6cd16258b6d459a1c118670

    SHA512

    02ddb3dd155fccd0c5385afc9757b12473d71d26f31a9f0e5435e81efc43df345cd153bd2ca3af10239038bcf16952490ebf845d049100bd8d0e0b4c27467be6

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\XIW5WJ0M.cookie
    MD5

    d01cf335cc8c76bc1d83e505f43c0394

    SHA1

    2dda865a3984b145e0c53a8e8121f7ef0107566b

    SHA256

    87fb3a35c344dd2278f3ae49e132548b26538eab8fbf0e22b4ce9d8073fb50de

    SHA512

    8e6292fa137dea8e9d60d7add8fd63fbf513f902cf39ef67c7f9ff9fb1ca99949752dd113be76c864640f2fb212fe109aa34052124b61b888f4cae493f74d311

  • memory/1640-115-0x0000000000000000-mapping.dmp
  • memory/3260-114-0x00007FFAA4D60000-0x00007FFAA4DCB000-memory.dmp
    Filesize

    428KB