Analysis

  • max time kernel
    32s
  • max time network
    35s
  • platform
    windows10_x64
  • resource
    win10-en-20211014
  • submitted
    09-11-2021 15:14

General

  • Target

    New Fax Receiνed For.htm

  • Size

    710KB

  • MD5

    cc600e0ae18f94b7317b73f49b119fbd

  • SHA1

    ec1eff7473bd7743658c75555b3f3b467ea9fb85

  • SHA256

    3e8a6cdec188c0ec8a963c6069a585cda2121c2cd66bbee0e9a8c02b7710f183

  • SHA512

    63a14ad8b0a3c2a134616ce97657d921924b74356bd4a2faf7153c170a6f280e1325ac67bb32e4b0deec726ca13720f6f7057e7f5ddbe479d8bc93a058a27a66

Score
6/10

Malware Config

Signatures

  • Program crash 1 IoCs
  • Detected potential entity reuse from brand microsoft.
  • Modifies Internet Explorer settings 1 TTPs 22 IoCs
  • Suspicious behavior: EnumeratesProcesses 15 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" "C:\Users\Admin\AppData\Local\Temp\New Fax Receiνed For.htm"
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2700
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2700 CREDAT:82945 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:504
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2700 CREDAT:82949 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      PID:4052
      • C:\Windows\system32\WerFault.exe
        C:\Windows\system32\WerFault.exe -u -p 4052 -s 2520
        3⤵
        • Program crash
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1056

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/504-141-0x0000000000000000-mapping.dmp
  • memory/2700-143-0x00007FFD2BE10000-0x00007FFD2BE7B000-memory.dmp
    Filesize

    428KB

  • memory/2700-120-0x00007FFD2BE10000-0x00007FFD2BE7B000-memory.dmp
    Filesize

    428KB

  • memory/2700-119-0x00007FFD2BE10000-0x00007FFD2BE7B000-memory.dmp
    Filesize

    428KB

  • memory/2700-115-0x00007FFD2BE10000-0x00007FFD2BE7B000-memory.dmp
    Filesize

    428KB

  • memory/2700-121-0x00007FFD2BE10000-0x00007FFD2BE7B000-memory.dmp
    Filesize

    428KB

  • memory/2700-122-0x00007FFD2BE10000-0x00007FFD2BE7B000-memory.dmp
    Filesize

    428KB

  • memory/2700-123-0x00007FFD2BE10000-0x00007FFD2BE7B000-memory.dmp
    Filesize

    428KB

  • memory/2700-124-0x00007FFD2BE10000-0x00007FFD2BE7B000-memory.dmp
    Filesize

    428KB

  • memory/2700-125-0x00007FFD2BE10000-0x00007FFD2BE7B000-memory.dmp
    Filesize

    428KB

  • memory/2700-127-0x00007FFD2BE10000-0x00007FFD2BE7B000-memory.dmp
    Filesize

    428KB

  • memory/2700-128-0x00007FFD2BE10000-0x00007FFD2BE7B000-memory.dmp
    Filesize

    428KB

  • memory/2700-129-0x00007FFD2BE10000-0x00007FFD2BE7B000-memory.dmp
    Filesize

    428KB

  • memory/2700-131-0x00007FFD2BE10000-0x00007FFD2BE7B000-memory.dmp
    Filesize

    428KB

  • memory/2700-132-0x00007FFD2BE10000-0x00007FFD2BE7B000-memory.dmp
    Filesize

    428KB

  • memory/2700-134-0x00007FFD2BE10000-0x00007FFD2BE7B000-memory.dmp
    Filesize

    428KB

  • memory/2700-145-0x00007FFD2BE10000-0x00007FFD2BE7B000-memory.dmp
    Filesize

    428KB

  • memory/2700-136-0x00007FFD2BE10000-0x00007FFD2BE7B000-memory.dmp
    Filesize

    428KB

  • memory/2700-137-0x00007FFD2BE10000-0x00007FFD2BE7B000-memory.dmp
    Filesize

    428KB

  • memory/2700-138-0x00007FFD2BE10000-0x00007FFD2BE7B000-memory.dmp
    Filesize

    428KB

  • memory/2700-140-0x00007FFD2BE10000-0x00007FFD2BE7B000-memory.dmp
    Filesize

    428KB

  • memory/2700-116-0x00007FFD2BE10000-0x00007FFD2BE7B000-memory.dmp
    Filesize

    428KB

  • memory/2700-117-0x00007FFD2BE10000-0x00007FFD2BE7B000-memory.dmp
    Filesize

    428KB

  • memory/2700-135-0x00007FFD2BE10000-0x00007FFD2BE7B000-memory.dmp
    Filesize

    428KB

  • memory/2700-146-0x00007FFD2BE10000-0x00007FFD2BE7B000-memory.dmp
    Filesize

    428KB

  • memory/2700-148-0x00007FFD2BE10000-0x00007FFD2BE7B000-memory.dmp
    Filesize

    428KB

  • memory/2700-150-0x00007FFD2BE10000-0x00007FFD2BE7B000-memory.dmp
    Filesize

    428KB

  • memory/2700-151-0x00007FFD2BE10000-0x00007FFD2BE7B000-memory.dmp
    Filesize

    428KB

  • memory/2700-152-0x00007FFD2BE10000-0x00007FFD2BE7B000-memory.dmp
    Filesize

    428KB

  • memory/2700-156-0x00007FFD2BE10000-0x00007FFD2BE7B000-memory.dmp
    Filesize

    428KB

  • memory/2700-157-0x00007FFD2BE10000-0x00007FFD2BE7B000-memory.dmp
    Filesize

    428KB

  • memory/2700-158-0x00007FFD2BE10000-0x00007FFD2BE7B000-memory.dmp
    Filesize

    428KB

  • memory/2700-164-0x00007FFD2BE10000-0x00007FFD2BE7B000-memory.dmp
    Filesize

    428KB

  • memory/2700-165-0x00007FFD2BE10000-0x00007FFD2BE7B000-memory.dmp
    Filesize

    428KB

  • memory/2700-166-0x00007FFD2BE10000-0x00007FFD2BE7B000-memory.dmp
    Filesize

    428KB

  • memory/2700-167-0x00007FFD2BE10000-0x00007FFD2BE7B000-memory.dmp
    Filesize

    428KB

  • memory/2700-168-0x00007FFD2BE10000-0x00007FFD2BE7B000-memory.dmp
    Filesize

    428KB

  • memory/2700-169-0x00007FFD2BE10000-0x00007FFD2BE7B000-memory.dmp
    Filesize

    428KB

  • memory/4052-173-0x0000000000000000-mapping.dmp
  • memory/4052-174-0x00007FFD2BE10000-0x00007FFD2BE7B000-memory.dmp
    Filesize

    428KB

  • memory/4052-175-0x00007FFD2BE10000-0x00007FFD2BE7B000-memory.dmp
    Filesize

    428KB

  • memory/4052-176-0x00007FFD2BE10000-0x00007FFD2BE7B000-memory.dmp
    Filesize

    428KB

  • memory/4052-177-0x00007FFD2BE10000-0x00007FFD2BE7B000-memory.dmp
    Filesize

    428KB

  • memory/4052-180-0x00007FFD2BE10000-0x00007FFD2BE7B000-memory.dmp
    Filesize

    428KB