Analysis

  • max time kernel
    48s
  • max time network
    51s
  • platform
    windows7_x64
  • resource
    win7-en-20210920
  • submitted
    11-10-2021 13:38

General

  • Target

    Note514 ‮‮‮fdp.html

  • Size

    1.2MB

  • MD5

    ef32cbeb73aa743a027ae3ff4e43f020

  • SHA1

    a32c5b965234c575b645969724a76d1e0f5b9409

  • SHA256

    e55e68f63e103f6a39a08d6c15900d13faedf3eb9ff6af0e19e997908585e54b

  • SHA512

    fca307f4d9ba330909192aa86e67f3bc3629ad4cfef95c41da6b401daf24406adb6ab16cb14b24a078319c6c9688b80caf614d8fa4c8809a6b68c4b88725d569

Score
5/10

Malware Config

Signatures

  • Detected potential entity reuse from brand microsoft.
  • Modifies Internet Explorer settings 1 TTPs 37 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 21 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" "C:\Users\Admin\AppData\Local\Temp\Note514 ‮‮‮fdp.html"
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1720
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1720 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1056

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\wkz58mr\imagestore.dat
    MD5

    595c76dc6466bea598087bfd5fd1751b

    SHA1

    42ec7b452b7178a4767a745b785d928a19f0582c

    SHA256

    33d0311ef114587184a17df62c6f75f77eb63fafc8db6f55e6adfd6cd1cd0291

    SHA512

    f33049432fc166d100802199c7733352acc852be631c6a56e311d2aabe4a4fe845247a304d335a98a4c974cc4adc9e3427f7199018e875f98624bf2a0c555c2c

  • memory/1056-53-0x0000000000000000-mapping.dmp