Analysis

  • max time kernel
    88s
  • max time network
    83s
  • platform
    windows10_x64
  • resource
    win10-en-20211104
  • submitted
    09-11-2021 15:12

General

  • Target

    New Fax Receiνed For.htm

  • Size

    710KB

  • MD5

    cc600e0ae18f94b7317b73f49b119fbd

  • SHA1

    ec1eff7473bd7743658c75555b3f3b467ea9fb85

  • SHA256

    3e8a6cdec188c0ec8a963c6069a585cda2121c2cd66bbee0e9a8c02b7710f183

  • SHA512

    63a14ad8b0a3c2a134616ce97657d921924b74356bd4a2faf7153c170a6f280e1325ac67bb32e4b0deec726ca13720f6f7057e7f5ddbe479d8bc93a058a27a66

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 3 IoCs
  • Program crash 1 IoCs
  • Detected potential entity reuse from brand microsoft.
  • Drops file in Windows directory 3 IoCs
  • Checks SCSI registry key(s) 3 TTPs 4 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 53 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 15 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of FindShellTrayWindow 5 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" "C:\Users\Admin\AppData\Local\Temp\New Fax Receiνed For.htm"
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3844
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3844 CREDAT:82945 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1124
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:3844 CREDAT:82950 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      PID:3640
      • C:\Windows\system32\WerFault.exe
        C:\Windows\system32\WerFault.exe -u -p 3640 -s 2448
        3⤵
        • Program crash
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3548
  • C:\Program Files\Mozilla Firefox\firefox.exe
    "C:\Program Files\Mozilla Firefox\firefox.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2428
    • C:\Program Files\Mozilla Firefox\firefox.exe
      "C:\Program Files\Mozilla Firefox\firefox.exe"
      2⤵
      • Checks processor information in registry
      • Modifies registry class
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3980
      • C:\Program Files\Mozilla Firefox\firefox.exe
        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3980.0.1807600935\861625193" -parentBuildID 20200403170909 -prefsHandle 1528 -prefMapHandle 1516 -prefsLen 1 -prefMapSize 219680 -appdir "C:\Program Files\Mozilla Firefox\browser" - 3980 "\\.\pipe\gecko-crash-server-pipe.3980" 1604 gpu
        3⤵
          PID:1216
        • C:\Program Files\Mozilla Firefox\firefox.exe
          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3980.3.1138400698\346968049" -childID 1 -isForBrowser -prefsHandle 2252 -prefMapHandle 2160 -prefsLen 122 -prefMapSize 219680 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 3980 "\\.\pipe\gecko-crash-server-pipe.3980" 2264 tab
          3⤵
            PID:3480
          • C:\Program Files\Mozilla Firefox\firefox.exe
            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3980.13.1403333682\1310206986" -childID 2 -isForBrowser -prefsHandle 3340 -prefMapHandle 3336 -prefsLen 6979 -prefMapSize 219680 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 3980 "\\.\pipe\gecko-crash-server-pipe.3980" 3320 tab
            3⤵
              PID:1792
            • C:\Program Files\Mozilla Firefox\firefox.exe
              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3980.20.1460645197\1294217566" -childID 3 -isForBrowser -prefsHandle 4444 -prefMapHandle 4468 -prefsLen 7684 -prefMapSize 219680 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 3980 "\\.\pipe\gecko-crash-server-pipe.3980" 2708 tab
              3⤵
                PID:1092
              • C:\Program Files\Mozilla Firefox\uninstall\helper.exe
                "C:\Program Files\Mozilla Firefox\uninstall\helper.exe" /SetAsDefaultAppUser
                3⤵
                • Loads dropped DLL
                • Suspicious use of AdjustPrivilegeToken
                PID:3912
          • C:\Windows\ImmersiveControlPanel\SystemSettings.exe
            "C:\Windows\ImmersiveControlPanel\SystemSettings.exe" -ServerName:microsoft.windows.immersivecontrolpanel
            1⤵
            • Drops file in Windows directory
            • Checks SCSI registry key(s)
            • Modifies registry class
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            PID:4220

          Network

          MITRE ATT&CK Matrix ATT&CK v6

          Defense Evasion

          Modify Registry

          1
          T1112

          Discovery

          Query Registry

          2
          T1012

          Peripheral Device Discovery

          1
          T1120

          System Information Discovery

          2
          T1082

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
            MD5

            1c3ed22c003b0e1724a802f750244f60

            SHA1

            c83f95230ea4d3ac58c4f5d5a7504b0f5eedf0ad

            SHA256

            f24de6edda835df45daadcce85ecfeaa1f5a363a16faeff1c16ae55ec57dcb6b

            SHA512

            7f9f0395307b63d4bda636b132533f5e62b36bfa78ff0850c5ba0a2ebe3f426b0a18232993a35bfe9166d9f86d2dfe2ad6429fc864265a0bdf6d4f1f25d26297

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
            MD5

            e2cf535d36d4727db08e73304b62e16f

            SHA1

            552ffe409551cd3413ac0f8400e81463839ac0d5

            SHA256

            4aca051e3e8339fa8d2c0562490bf80b77c8d876209a0493d60aae0a0bb0aeed

            SHA512

            412cf853bc08358feb74eb802cc8d08a77005b3919798c1bac9819b7d3aec66fa27848305da46ae3a38ae87db7b39268d2c18f1ab3b1f05891aa88a4edc6f46e

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\13X0AX0A.cookie
            MD5

            9f32ac2b56775aa3d28c680910468b99

            SHA1

            727897a7a18ba04f5256808a96f733ee5514d287

            SHA256

            a954b58d11c66a9bc2b3d7f24c5d0e0250285ce27a495803f3955f1ac275102c

            SHA512

            0a859870a239a948afc2da5b8407a80fb5723b6daadba67e0f108afb054f5ee156d24e441012e066927d1bf74d5f61a7783a034afba3f69aac7d326dba7ced43

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\SPQJV2C9.cookie
            MD5

            0855efbe43a66ae08eb32d9693c32b6a

            SHA1

            d6047778f1fdb96ad79d99980d7375fbf98ac7ff

            SHA256

            11e7bdfcf715e4795358fc646e5f62665ddcddf9d515e97689e0414faab39072

            SHA512

            a5f097ad3f92c6c6a313282e6afc5b36800ba941495151a1d9610cf480bc30305dbe153538e9ff67dcc1f8b7547fa803c1a4e604d120a6774681c63d3cf14b78

          • \Users\Admin\AppData\Local\Temp\nsxD464.tmp\CityHash.dll
            MD5

            737379945745bb94f8a0dadcc18cad8d

            SHA1

            6a1f497b4dc007f5935b66ec83b00e5a394332c6

            SHA256

            d3d7b3d7a7941d66c7f75257be90b12ac76f787af42cd58f019ce0280972598a

            SHA512

            c4a43b3ca42483cbd117758791d4333ddf38fa45eb3377f7b71ce74ec6e4d8b5ef2bfbe48c249d4eaf57ab929f4301138e53c79e0fa4be94dcbcd69c8046bc22

          • \Users\Admin\AppData\Local\Temp\nsxD464.tmp\CityHash.dll
            MD5

            737379945745bb94f8a0dadcc18cad8d

            SHA1

            6a1f497b4dc007f5935b66ec83b00e5a394332c6

            SHA256

            d3d7b3d7a7941d66c7f75257be90b12ac76f787af42cd58f019ce0280972598a

            SHA512

            c4a43b3ca42483cbd117758791d4333ddf38fa45eb3377f7b71ce74ec6e4d8b5ef2bfbe48c249d4eaf57ab929f4301138e53c79e0fa4be94dcbcd69c8046bc22

          • \Users\Admin\AppData\Local\Temp\nsxD464.tmp\System.dll
            MD5

            17ed1c86bd67e78ade4712be48a7d2bd

            SHA1

            1cc9fe86d6d6030b4dae45ecddce5907991c01a0

            SHA256

            bd046e6497b304e4ea4ab102cab2b1f94ce09bde0eebba4c59942a732679e4eb

            SHA512

            0cbed521e7d6d1f85977b3f7d3ca7ac34e1b5495b69fd8c7bfa1a846baf53b0ecd06fe1ad02a3599082ffacaf8c71a3bb4e32dec05f8e24859d736b828092cd5

          • memory/1124-144-0x0000000000000000-mapping.dmp
          • memory/3640-183-0x00007FF8A95D0000-0x00007FF8A963B000-memory.dmp
            Filesize

            428KB

          • memory/3640-180-0x00007FF8A95D0000-0x00007FF8A963B000-memory.dmp
            Filesize

            428KB

          • memory/3640-179-0x00007FF8A95D0000-0x00007FF8A963B000-memory.dmp
            Filesize

            428KB

          • memory/3640-178-0x00007FF8A95D0000-0x00007FF8A963B000-memory.dmp
            Filesize

            428KB

          • memory/3640-177-0x00007FF8A95D0000-0x00007FF8A963B000-memory.dmp
            Filesize

            428KB

          • memory/3640-176-0x0000000000000000-mapping.dmp
          • memory/3844-134-0x00007FF8A95D0000-0x00007FF8A963B000-memory.dmp
            Filesize

            428KB

          • memory/3844-168-0x00007FF8A95D0000-0x00007FF8A963B000-memory.dmp
            Filesize

            428KB

          • memory/3844-138-0x00007FF8A95D0000-0x00007FF8A963B000-memory.dmp
            Filesize

            428KB

          • memory/3844-139-0x00007FF8A95D0000-0x00007FF8A963B000-memory.dmp
            Filesize

            428KB

          • memory/3844-140-0x00007FF8A95D0000-0x00007FF8A963B000-memory.dmp
            Filesize

            428KB

          • memory/3844-141-0x00007FF8A95D0000-0x00007FF8A963B000-memory.dmp
            Filesize

            428KB

          • memory/3844-143-0x00007FF8A95D0000-0x00007FF8A963B000-memory.dmp
            Filesize

            428KB

          • memory/3844-136-0x00007FF8A95D0000-0x00007FF8A963B000-memory.dmp
            Filesize

            428KB

          • memory/3844-146-0x00007FF8A95D0000-0x00007FF8A963B000-memory.dmp
            Filesize

            428KB

          • memory/3844-148-0x00007FF8A95D0000-0x00007FF8A963B000-memory.dmp
            Filesize

            428KB

          • memory/3844-149-0x00007FF8A95D0000-0x00007FF8A963B000-memory.dmp
            Filesize

            428KB

          • memory/3844-151-0x00007FF8A95D0000-0x00007FF8A963B000-memory.dmp
            Filesize

            428KB

          • memory/3844-153-0x00007FF8A95D0000-0x00007FF8A963B000-memory.dmp
            Filesize

            428KB

          • memory/3844-154-0x00007FF8A95D0000-0x00007FF8A963B000-memory.dmp
            Filesize

            428KB

          • memory/3844-155-0x00007FF8A95D0000-0x00007FF8A963B000-memory.dmp
            Filesize

            428KB

          • memory/3844-159-0x00007FF8A95D0000-0x00007FF8A963B000-memory.dmp
            Filesize

            428KB

          • memory/3844-160-0x00007FF8A95D0000-0x00007FF8A963B000-memory.dmp
            Filesize

            428KB

          • memory/3844-161-0x00007FF8A95D0000-0x00007FF8A963B000-memory.dmp
            Filesize

            428KB

          • memory/3844-167-0x00007FF8A95D0000-0x00007FF8A963B000-memory.dmp
            Filesize

            428KB

          • memory/3844-137-0x00007FF8A95D0000-0x00007FF8A963B000-memory.dmp
            Filesize

            428KB

          • memory/3844-169-0x00007FF8A95D0000-0x00007FF8A963B000-memory.dmp
            Filesize

            428KB

          • memory/3844-171-0x00007FF8A95D0000-0x00007FF8A963B000-memory.dmp
            Filesize

            428KB

          • memory/3844-170-0x00007FF8A95D0000-0x00007FF8A963B000-memory.dmp
            Filesize

            428KB

          • memory/3844-172-0x00007FF8A95D0000-0x00007FF8A963B000-memory.dmp
            Filesize

            428KB

          • memory/3844-118-0x00007FF8A95D0000-0x00007FF8A963B000-memory.dmp
            Filesize

            428KB

          • memory/3844-131-0x00007FF8A95D0000-0x00007FF8A963B000-memory.dmp
            Filesize

            428KB

          • memory/3844-132-0x00007FF8A95D0000-0x00007FF8A963B000-memory.dmp
            Filesize

            428KB

          • memory/3844-130-0x00007FF8A95D0000-0x00007FF8A963B000-memory.dmp
            Filesize

            428KB

          • memory/3844-127-0x00007FF8A95D0000-0x00007FF8A963B000-memory.dmp
            Filesize

            428KB

          • memory/3844-128-0x00007FF8A95D0000-0x00007FF8A963B000-memory.dmp
            Filesize

            428KB

          • memory/3844-126-0x00007FF8A95D0000-0x00007FF8A963B000-memory.dmp
            Filesize

            428KB

          • memory/3844-125-0x00007FF8A95D0000-0x00007FF8A963B000-memory.dmp
            Filesize

            428KB

          • memory/3844-124-0x00007FF8A95D0000-0x00007FF8A963B000-memory.dmp
            Filesize

            428KB

          • memory/3844-123-0x00007FF8A95D0000-0x00007FF8A963B000-memory.dmp
            Filesize

            428KB

          • memory/3844-119-0x00007FF8A95D0000-0x00007FF8A963B000-memory.dmp
            Filesize

            428KB

          • memory/3844-122-0x00007FF8A95D0000-0x00007FF8A963B000-memory.dmp
            Filesize

            428KB

          • memory/3844-120-0x00007FF8A95D0000-0x00007FF8A963B000-memory.dmp
            Filesize

            428KB

          • memory/3912-261-0x0000000000000000-mapping.dmp