Analysis

  • max time kernel
    133s
  • max time network
    135s
  • platform
    windows10_x64
  • resource
    win10-en-20211014
  • submitted
    28-10-2021 14:05

General

  • Target

    message.html

  • Size

    1.9MB

  • MD5

    552d5294c7294e6efcddb6ac0e1b0fcc

  • SHA1

    4c96ee5664839273dc7120fff06ed255ad097299

  • SHA256

    6453a5f675718863156581fc9c5f5b6997d8e0d114b10933ad37418b5202e15a

  • SHA512

    17be1ffbc2dc3ca6d0021224ee4c677725b50c8144542cfc1dc2efcf0cbe4504b102a39419c353b640a8a5fccef5c3e4c290fcda6ee3e2a4c6da8a36e1eb3f4a

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\message.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2648
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2648 CREDAT:82945 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2312

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\1BBR8OZA.cookie
    MD5

    6f6cd57a60e21ac5a6bbd31526b1139c

    SHA1

    5cb327903a32365925b27db9567f5b01964f5d6a

    SHA256

    9234eb2cccc53607fbaf9d12fd945b94e9114bd0774be4f0e7d4693889bba93f

    SHA512

    40663ac81a7c84f51537493c3e72952e207944ba938a0720a912fbe4f464a1a681bd3fdf11fa275072b21b4cbe7b20a52dcae4cdd6c04f23a5d1d5ddcbc9c0de

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\O8UN1C50.cookie
    MD5

    83e190cdaa7f7226495aee13f4b7a26b

    SHA1

    fc6831284e4abdbee4a1da95215d1b6449d7ba86

    SHA256

    7b541780267a755f7be59066ae59fa6c0d09f96f14550085bf3b10787a386561

    SHA512

    9546c2a4962981006edb47fcf77554e5ff9e40a014c06cc8a7f05595b208f1dbdfef14ec8486e516c5fe52c12986d226d078c7cc1478ab1d2ca35e253d237c8d

  • memory/2312-141-0x0000000000000000-mapping.dmp
  • memory/2648-143-0x00007FFB41010000-0x00007FFB4107B000-memory.dmp
    Filesize

    428KB

  • memory/2648-127-0x00007FFB41010000-0x00007FFB4107B000-memory.dmp
    Filesize

    428KB

  • memory/2648-121-0x00007FFB41010000-0x00007FFB4107B000-memory.dmp
    Filesize

    428KB

  • memory/2648-145-0x00007FFB41010000-0x00007FFB4107B000-memory.dmp
    Filesize

    428KB

  • memory/2648-123-0x00007FFB41010000-0x00007FFB4107B000-memory.dmp
    Filesize

    428KB

  • memory/2648-148-0x00007FFB41010000-0x00007FFB4107B000-memory.dmp
    Filesize

    428KB

  • memory/2648-125-0x00007FFB41010000-0x00007FFB4107B000-memory.dmp
    Filesize

    428KB

  • memory/2648-146-0x00007FFB41010000-0x00007FFB4107B000-memory.dmp
    Filesize

    428KB

  • memory/2648-128-0x00007FFB41010000-0x00007FFB4107B000-memory.dmp
    Filesize

    428KB

  • memory/2648-129-0x00007FFB41010000-0x00007FFB4107B000-memory.dmp
    Filesize

    428KB

  • memory/2648-131-0x00007FFB41010000-0x00007FFB4107B000-memory.dmp
    Filesize

    428KB

  • memory/2648-132-0x00007FFB41010000-0x00007FFB4107B000-memory.dmp
    Filesize

    428KB

  • memory/2648-133-0x00007FFB41010000-0x00007FFB4107B000-memory.dmp
    Filesize

    428KB

  • memory/2648-135-0x00007FFB41010000-0x00007FFB4107B000-memory.dmp
    Filesize

    428KB

  • memory/2648-136-0x00007FFB41010000-0x00007FFB4107B000-memory.dmp
    Filesize

    428KB

  • memory/2648-137-0x00007FFB41010000-0x00007FFB4107B000-memory.dmp
    Filesize

    428KB

  • memory/2648-138-0x00007FFB41010000-0x00007FFB4107B000-memory.dmp
    Filesize

    428KB

  • memory/2648-140-0x00007FFB41010000-0x00007FFB4107B000-memory.dmp
    Filesize

    428KB

  • memory/2648-119-0x00007FFB41010000-0x00007FFB4107B000-memory.dmp
    Filesize

    428KB

  • memory/2648-115-0x00007FFB41010000-0x00007FFB4107B000-memory.dmp
    Filesize

    428KB

  • memory/2648-122-0x00007FFB41010000-0x00007FFB4107B000-memory.dmp
    Filesize

    428KB

  • memory/2648-120-0x00007FFB41010000-0x00007FFB4107B000-memory.dmp
    Filesize

    428KB

  • memory/2648-124-0x00007FFB41010000-0x00007FFB4107B000-memory.dmp
    Filesize

    428KB

  • memory/2648-151-0x00007FFB41010000-0x00007FFB4107B000-memory.dmp
    Filesize

    428KB

  • memory/2648-150-0x00007FFB41010000-0x00007FFB4107B000-memory.dmp
    Filesize

    428KB

  • memory/2648-152-0x00007FFB41010000-0x00007FFB4107B000-memory.dmp
    Filesize

    428KB

  • memory/2648-156-0x00007FFB41010000-0x00007FFB4107B000-memory.dmp
    Filesize

    428KB

  • memory/2648-157-0x00007FFB41010000-0x00007FFB4107B000-memory.dmp
    Filesize

    428KB

  • memory/2648-158-0x00007FFB41010000-0x00007FFB4107B000-memory.dmp
    Filesize

    428KB

  • memory/2648-164-0x00007FFB41010000-0x00007FFB4107B000-memory.dmp
    Filesize

    428KB

  • memory/2648-165-0x00007FFB41010000-0x00007FFB4107B000-memory.dmp
    Filesize

    428KB

  • memory/2648-166-0x00007FFB41010000-0x00007FFB4107B000-memory.dmp
    Filesize

    428KB

  • memory/2648-167-0x00007FFB41010000-0x00007FFB4107B000-memory.dmp
    Filesize

    428KB

  • memory/2648-168-0x00007FFB41010000-0x00007FFB4107B000-memory.dmp
    Filesize

    428KB

  • memory/2648-169-0x00007FFB41010000-0x00007FFB4107B000-memory.dmp
    Filesize

    428KB

  • memory/2648-173-0x00007FFB41010000-0x00007FFB4107B000-memory.dmp
    Filesize

    428KB

  • memory/2648-175-0x00007FFB41010000-0x00007FFB4107B000-memory.dmp
    Filesize

    428KB

  • memory/2648-178-0x00007FFB41010000-0x00007FFB4107B000-memory.dmp
    Filesize

    428KB

  • memory/2648-179-0x00007FFB41010000-0x00007FFB4107B000-memory.dmp
    Filesize

    428KB

  • memory/2648-117-0x00007FFB41010000-0x00007FFB4107B000-memory.dmp
    Filesize

    428KB

  • memory/2648-116-0x00007FFB41010000-0x00007FFB4107B000-memory.dmp
    Filesize

    428KB