Analysis

  • max time kernel
    306s
  • max time network
    364s
  • platform
    windows10_x64
  • resource
    win10-en-20211104
  • submitted
    05-11-2021 19:48

General

  • Target

    44505.5459869212.dat.html

  • Size

    146B

  • MD5

    9fe3cb2b7313dc79bb477bc8fde184a7

  • SHA1

    4d7b3cb41e90618358d0ee066c45c76227a13747

  • SHA256

    32f2fa940d4b4fe19aca1e53a24e5aac29c57b7c5ee78588325b87f1b649c864

  • SHA512

    c54ad4f5292784e50b4830a8210b0d4d4ee08b803f4975c9859e637d483b3af38cb0436ac501dea0c73867b1a2c41b39ef2c27dc3fb20f3f27519b719ea743db

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 51 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\44505.5459869212.dat.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2580
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2580 CREDAT:82945 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1032

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    MD5

    a46e27d1a674a729535408d54d78d4e6

    SHA1

    1ad0f6b6df35fcaf74aacb6195d93132d08ea74d

    SHA256

    c95ecbe6c10d85cb26ea3272fdc61301e5787f74c4b94fbf893116776ca81e48

    SHA512

    412d5ef57f201da817f15a7d7e091ca84a800934c7d33e83b878c363e70493b91119cd967b957099bb874c12ccc7879ce15f9ab81b813fd181d5d45e27b186b3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    MD5

    a2e1c84e2badbcb83f1bc80e070dbb3f

    SHA1

    2403923a316dc38a166e8685fa28b1f31e8d90d8

    SHA256

    376cac3ae77cfa59e0147d2c049c38b41476da690ecf630f7540b06a22adb8a9

    SHA512

    e76012bd155866236a752ec2fc0b60bd23f1f07185d0cbb38b20cf46f19c56c6774eb2a6b36c8899bc41122efaecc626d9f79b97d9897d90f03b8df5da5b195b

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\1TF55IBM.cookie

    MD5

    2fa9deb23e44d77eecea4050734f3333

    SHA1

    1c9314b2e640f03c542778ea88a077386bdfd097

    SHA256

    55d3da3dad3d64c80c38c1f15f4a499370fcbab38a769c5b23c80505f06031ba

    SHA512

    a954d84f48f159b354c5872a5c33d1b6bbd7d5acb9e77c60ab4e7f67792d8ca54e9735748e8880287535a504595ef6f093caf7fb5f8e3c5e9c734955929ccc92

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\JOSA03YD.cookie

    MD5

    90a0576ec47d7d5595c8de474f7dbfcd

    SHA1

    51d41b42b107af84348f1ce9ced7cdcc1459c0f6

    SHA256

    302ec22e5645b79dd385310ec562cea12259dc2c80be5e06f2060de64825a254

    SHA512

    b210e6fe798858564a90f64c9166240a714fe74ff9731951d3a2ef4bfcbe182638b65dffe8dd7daaf3cef1f3080697154abeb6b51e5727122f507b2b8d95038e

  • memory/1032-144-0x0000000000000000-mapping.dmp

  • memory/2580-146-0x00007FFBC74E0000-0x00007FFBC754B000-memory.dmp

    Filesize

    428KB

  • memory/2580-177-0x00007FFBC74E0000-0x00007FFBC754B000-memory.dmp

    Filesize

    428KB

  • memory/2580-120-0x00007FFBC74E0000-0x00007FFBC754B000-memory.dmp

    Filesize

    428KB

  • memory/2580-122-0x00007FFBC74E0000-0x00007FFBC754B000-memory.dmp

    Filesize

    428KB

  • memory/2580-123-0x00007FFBC74E0000-0x00007FFBC754B000-memory.dmp

    Filesize

    428KB

  • memory/2580-124-0x00007FFBC74E0000-0x00007FFBC754B000-memory.dmp

    Filesize

    428KB

  • memory/2580-125-0x00007FFBC74E0000-0x00007FFBC754B000-memory.dmp

    Filesize

    428KB

  • memory/2580-126-0x00007FFBC74E0000-0x00007FFBC754B000-memory.dmp

    Filesize

    428KB

  • memory/2580-127-0x00007FFBC74E0000-0x00007FFBC754B000-memory.dmp

    Filesize

    428KB

  • memory/2580-128-0x00007FFBC74E0000-0x00007FFBC754B000-memory.dmp

    Filesize

    428KB

  • memory/2580-130-0x00007FFBC74E0000-0x00007FFBC754B000-memory.dmp

    Filesize

    428KB

  • memory/2580-131-0x00007FFBC74E0000-0x00007FFBC754B000-memory.dmp

    Filesize

    428KB

  • memory/2580-132-0x00007FFBC74E0000-0x00007FFBC754B000-memory.dmp

    Filesize

    428KB

  • memory/2580-134-0x00007FFBC74E0000-0x00007FFBC754B000-memory.dmp

    Filesize

    428KB

  • memory/2580-135-0x00007FFBC74E0000-0x00007FFBC754B000-memory.dmp

    Filesize

    428KB

  • memory/2580-138-0x00007FFBC74E0000-0x00007FFBC754B000-memory.dmp

    Filesize

    428KB

  • memory/2580-139-0x00007FFBC74E0000-0x00007FFBC754B000-memory.dmp

    Filesize

    428KB

  • memory/2580-137-0x00007FFBC74E0000-0x00007FFBC754B000-memory.dmp

    Filesize

    428KB

  • memory/2580-140-0x00007FFBC74E0000-0x00007FFBC754B000-memory.dmp

    Filesize

    428KB

  • memory/2580-141-0x00007FFBC74E0000-0x00007FFBC754B000-memory.dmp

    Filesize

    428KB

  • memory/2580-143-0x00007FFBC74E0000-0x00007FFBC754B000-memory.dmp

    Filesize

    428KB

  • memory/2580-118-0x00007FFBC74E0000-0x00007FFBC754B000-memory.dmp

    Filesize

    428KB

  • memory/2580-183-0x00007FFBC74E0000-0x00007FFBC754B000-memory.dmp

    Filesize

    428KB

  • memory/2580-119-0x00007FFBC74E0000-0x00007FFBC754B000-memory.dmp

    Filesize

    428KB

  • memory/2580-155-0x00007FFBC74E0000-0x00007FFBC754B000-memory.dmp

    Filesize

    428KB

  • memory/2580-153-0x00007FFBC74E0000-0x00007FFBC754B000-memory.dmp

    Filesize

    428KB

  • memory/2580-154-0x00007FFBC74E0000-0x00007FFBC754B000-memory.dmp

    Filesize

    428KB

  • memory/2580-151-0x00007FFBC74E0000-0x00007FFBC754B000-memory.dmp

    Filesize

    428KB

  • memory/2580-159-0x00007FFBC74E0000-0x00007FFBC754B000-memory.dmp

    Filesize

    428KB

  • memory/2580-160-0x00007FFBC74E0000-0x00007FFBC754B000-memory.dmp

    Filesize

    428KB

  • memory/2580-161-0x00007FFBC74E0000-0x00007FFBC754B000-memory.dmp

    Filesize

    428KB

  • memory/2580-162-0x00007FFBC74E0000-0x00007FFBC754B000-memory.dmp

    Filesize

    428KB

  • memory/2580-163-0x00007FFBC74E0000-0x00007FFBC754B000-memory.dmp

    Filesize

    428KB

  • memory/2580-164-0x00007FFBC74E0000-0x00007FFBC754B000-memory.dmp

    Filesize

    428KB

  • memory/2580-165-0x00007FFBC74E0000-0x00007FFBC754B000-memory.dmp

    Filesize

    428KB

  • memory/2580-166-0x00007FFBC74E0000-0x00007FFBC754B000-memory.dmp

    Filesize

    428KB

  • memory/2580-170-0x00007FFBC74E0000-0x00007FFBC754B000-memory.dmp

    Filesize

    428KB

  • memory/2580-171-0x00007FFBC74E0000-0x00007FFBC754B000-memory.dmp

    Filesize

    428KB

  • memory/2580-174-0x00007FFBC74E0000-0x00007FFBC754B000-memory.dmp

    Filesize

    428KB

  • memory/2580-175-0x00007FFBC74E0000-0x00007FFBC754B000-memory.dmp

    Filesize

    428KB

  • memory/2580-176-0x00007FFBC74E0000-0x00007FFBC754B000-memory.dmp

    Filesize

    428KB

  • memory/2580-149-0x00007FFBC74E0000-0x00007FFBC754B000-memory.dmp

    Filesize

    428KB

  • memory/2580-178-0x00007FFBC74E0000-0x00007FFBC754B000-memory.dmp

    Filesize

    428KB

  • memory/2580-179-0x00007FFBC74E0000-0x00007FFBC754B000-memory.dmp

    Filesize

    428KB

  • memory/2580-180-0x00007FFBC74E0000-0x00007FFBC754B000-memory.dmp

    Filesize

    428KB

  • memory/2580-148-0x00007FFBC74E0000-0x00007FFBC754B000-memory.dmp

    Filesize

    428KB

  • memory/2580-184-0x00007FFBC74E0000-0x00007FFBC754B000-memory.dmp

    Filesize

    428KB