Analysis

  • max time kernel
    590s
  • max time network
    597s
  • platform
    windows10_x64
  • resource
    win10-en-20211014
  • submitted
    09-11-2021 16:46

General

  • Target

    MT103-FAX-INV4585942.pdf.htm_.html

  • Size

    710KB

  • MD5

    a16605c423f8190682a63cdb365bdee9

  • SHA1

    d905ab1d2a669d135e8e1ec9871151521250a090

  • SHA256

    68b4e99e2f1e4937fdb1ceb4df0f3be4ab486e745d6e7278f3f1a4e0981c92d9

  • SHA512

    9673b71985b7d4f0d318526687126c0efd36dc80781803720af41c9539b402693ba12e2c9c9a72286bb4cb5690df6002eb332b979c28c96e030fe97f5cbdc111

Score
5/10

Malware Config

Signatures

  • Detected potential entity reuse from brand microsoft.
  • Checks processor information in registry 2 TTPs 8 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 40 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 12 IoCs
  • Suspicious use of SendNotifyMessage 10 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\MT103-FAX-INV4585942.pdf.htm_.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3820
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3820 CREDAT:82945 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1876
  • C:\Program Files\Mozilla Firefox\firefox.exe
    "C:\Program Files\Mozilla Firefox\firefox.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2812
    • C:\Program Files\Mozilla Firefox\firefox.exe
      "C:\Program Files\Mozilla Firefox\firefox.exe"
      2⤵
      • Checks processor information in registry
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1140
      • C:\Program Files\Mozilla Firefox\firefox.exe
        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1140.0.1427641239\2015399174" -parentBuildID 20200403170909 -prefsHandle 1520 -prefMapHandle 1508 -prefsLen 1 -prefMapSize 219631 -appdir "C:\Program Files\Mozilla Firefox\browser" - 1140 "\\.\pipe\gecko-crash-server-pipe.1140" 1600 gpu
        3⤵
          PID:4680
        • C:\Program Files\Mozilla Firefox\firefox.exe
          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1140.3.1115695083\1574053826" -childID 1 -isForBrowser -prefsHandle 2292 -prefMapHandle 2288 -prefsLen 122 -prefMapSize 219631 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 1140 "\\.\pipe\gecko-crash-server-pipe.1140" 1424 tab
          3⤵
            PID:400
          • C:\Program Files\Mozilla Firefox\firefox.exe
            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1140.13.420069802\29539938" -childID 2 -isForBrowser -prefsHandle 2756 -prefMapHandle 2752 -prefsLen 988 -prefMapSize 219631 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 1140 "\\.\pipe\gecko-crash-server-pipe.1140" 2764 tab
            3⤵
              PID:2184
            • C:\Program Files\Mozilla Firefox\firefox.exe
              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1140.20.500212938\1951008191" -childID 3 -isForBrowser -prefsHandle 3644 -prefMapHandle 3640 -prefsLen 6979 -prefMapSize 219631 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 1140 "\\.\pipe\gecko-crash-server-pipe.1140" 3652 tab
              3⤵
                PID:1680
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1140.27.1934044544\974305720" -childID 4 -isForBrowser -prefsHandle 4160 -prefMapHandle 4124 -prefsLen 8061 -prefMapSize 219631 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 1140 "\\.\pipe\gecko-crash-server-pipe.1140" 2528 tab
                3⤵
                  PID:4320
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1140.34.725884711\862907908" -childID 5 -isForBrowser -prefsHandle 4876 -prefMapHandle 4872 -prefsLen 8061 -prefMapSize 219631 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 1140 "\\.\pipe\gecko-crash-server-pipe.1140" 4864 tab
                  3⤵
                    PID:4044
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe"
                1⤵
                • Suspicious use of WriteProcessMemory
                PID:60
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe"
                  2⤵
                  • Checks processor information in registry
                  PID:3220

              Network

              MITRE ATT&CK Matrix ATT&CK v6

              Defense Evasion

              Modify Registry

              1
              T1112

              Discovery

              Query Registry

              1
              T1012

              System Information Discovery

              1
              T1082

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\JQU4XYCG.cookie
                MD5

                82da70970bbab7c3bf5c4c5b74ba5228

                SHA1

                c135e9e972e4d322518b7b52c80c6011d88fc9fd

                SHA256

                261dbf5a422a39aa31ac29d0fa1520a45085a6dc8b90e8ea1c95cb6368f5c4a7

                SHA512

                b42d23f78068c97aced1b506eaf7133494634bed187fce1c962781ea36fa299a445d0ad206319daa3172ee8fd1d81ec5ab323313af9087d13c6775c0fd803c8e

              • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\R9DMNVNT.cookie
                MD5

                54838f88f8cb3e52b62cd10431bfd49f

                SHA1

                66a7865cf966a23ffbcf0812499dbe4cd8ac4945

                SHA256

                be2466fe97c579b4226d4eefc803a4178fc8b2712f8931e22e2b744742918a39

                SHA512

                31f924380c5645efbfad0c37b58e052180d161f8bd03ab00fcde5e9a29ac9413496876a382b6af9519ddbe819a788fc06d95c1f9f02d36c3dcb00864e623038f

              • memory/1876-141-0x0000000000000000-mapping.dmp
              • memory/3820-140-0x00007FFC24A60000-0x00007FFC24ACB000-memory.dmp
                Filesize

                428KB

              • memory/3820-169-0x00007FFC24A60000-0x00007FFC24ACB000-memory.dmp
                Filesize

                428KB

              • memory/3820-121-0x00007FFC24A60000-0x00007FFC24ACB000-memory.dmp
                Filesize

                428KB

              • memory/3820-122-0x00007FFC24A60000-0x00007FFC24ACB000-memory.dmp
                Filesize

                428KB

              • memory/3820-123-0x00007FFC24A60000-0x00007FFC24ACB000-memory.dmp
                Filesize

                428KB

              • memory/3820-124-0x00007FFC24A60000-0x00007FFC24ACB000-memory.dmp
                Filesize

                428KB

              • memory/3820-119-0x00007FFC24A60000-0x00007FFC24ACB000-memory.dmp
                Filesize

                428KB

              • memory/3820-127-0x00007FFC24A60000-0x00007FFC24ACB000-memory.dmp
                Filesize

                428KB

              • memory/3820-129-0x00007FFC24A60000-0x00007FFC24ACB000-memory.dmp
                Filesize

                428KB

              • memory/3820-128-0x00007FFC24A60000-0x00007FFC24ACB000-memory.dmp
                Filesize

                428KB

              • memory/3820-131-0x00007FFC24A60000-0x00007FFC24ACB000-memory.dmp
                Filesize

                428KB

              • memory/3820-132-0x00007FFC24A60000-0x00007FFC24ACB000-memory.dmp
                Filesize

                428KB

              • memory/3820-133-0x00007FFC24A60000-0x00007FFC24ACB000-memory.dmp
                Filesize

                428KB

              • memory/3820-135-0x00007FFC24A60000-0x00007FFC24ACB000-memory.dmp
                Filesize

                428KB

              • memory/3820-136-0x00007FFC24A60000-0x00007FFC24ACB000-memory.dmp
                Filesize

                428KB

              • memory/3820-137-0x00007FFC24A60000-0x00007FFC24ACB000-memory.dmp
                Filesize

                428KB

              • memory/3820-138-0x00007FFC24A60000-0x00007FFC24ACB000-memory.dmp
                Filesize

                428KB

              • memory/3820-145-0x00007FFC24A60000-0x00007FFC24ACB000-memory.dmp
                Filesize

                428KB

              • memory/3820-125-0x00007FFC24A60000-0x00007FFC24ACB000-memory.dmp
                Filesize

                428KB

              • memory/3820-120-0x00007FFC24A60000-0x00007FFC24ACB000-memory.dmp
                Filesize

                428KB

              • memory/3820-115-0x00007FFC24A60000-0x00007FFC24ACB000-memory.dmp
                Filesize

                428KB

              • memory/3820-146-0x00007FFC24A60000-0x00007FFC24ACB000-memory.dmp
                Filesize

                428KB

              • memory/3820-148-0x00007FFC24A60000-0x00007FFC24ACB000-memory.dmp
                Filesize

                428KB

              • memory/3820-150-0x00007FFC24A60000-0x00007FFC24ACB000-memory.dmp
                Filesize

                428KB

              • memory/3820-151-0x00007FFC24A60000-0x00007FFC24ACB000-memory.dmp
                Filesize

                428KB

              • memory/3820-152-0x00007FFC24A60000-0x00007FFC24ACB000-memory.dmp
                Filesize

                428KB

              • memory/3820-156-0x00007FFC24A60000-0x00007FFC24ACB000-memory.dmp
                Filesize

                428KB

              • memory/3820-157-0x00007FFC24A60000-0x00007FFC24ACB000-memory.dmp
                Filesize

                428KB

              • memory/3820-158-0x00007FFC24A60000-0x00007FFC24ACB000-memory.dmp
                Filesize

                428KB

              • memory/3820-164-0x00007FFC24A60000-0x00007FFC24ACB000-memory.dmp
                Filesize

                428KB

              • memory/3820-165-0x00007FFC24A60000-0x00007FFC24ACB000-memory.dmp
                Filesize

                428KB

              • memory/3820-166-0x00007FFC24A60000-0x00007FFC24ACB000-memory.dmp
                Filesize

                428KB

              • memory/3820-167-0x00007FFC24A60000-0x00007FFC24ACB000-memory.dmp
                Filesize

                428KB

              • memory/3820-168-0x00007FFC24A60000-0x00007FFC24ACB000-memory.dmp
                Filesize

                428KB

              • memory/3820-143-0x00007FFC24A60000-0x00007FFC24ACB000-memory.dmp
                Filesize

                428KB

              • memory/3820-173-0x00007FFC24A60000-0x00007FFC24ACB000-memory.dmp
                Filesize

                428KB

              • memory/3820-174-0x00007FFC24A60000-0x00007FFC24ACB000-memory.dmp
                Filesize

                428KB

              • memory/3820-177-0x00007FFC24A60000-0x00007FFC24ACB000-memory.dmp
                Filesize

                428KB

              • memory/3820-117-0x00007FFC24A60000-0x00007FFC24ACB000-memory.dmp
                Filesize

                428KB

              • memory/3820-116-0x00007FFC24A60000-0x00007FFC24ACB000-memory.dmp
                Filesize

                428KB