Resubmissions

11-11-2021 15:33

211111-szbhrabed3 6

11-11-2021 14:04

211111-rdm4zsgebq 1

Analysis

  • max time kernel
    118s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-en-20211014
  • submitted
    11-11-2021 14:04

General

  • Target

    ATT0002644.htm

  • Size

    429B

  • MD5

    9d950526df17880d6dd9a2c062460514

  • SHA1

    6ba6d639957de2090e11c846267b16f1f653069b

  • SHA256

    43fcc0500664221ce892a5ce713e27935b478389e463e8bc209880960acbdd83

  • SHA512

    f08731f68ad62fd50398bf0bd66d602700f2f2b53bc4fae9412cc0eb7494419eeb13d439733d2f49c67ce93214a96c8027e4170bb9ef36beccacd545e80af157

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 44 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ATT0002644.htm
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:608
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:608 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1864

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
    MD5

    acaeda60c79c6bcac925eeb3653f45e0

    SHA1

    2aaae490bcdaccc6172240ff1697753b37ac5578

    SHA256

    6b0ceccf0103afd89844761417c1d23acc41f8aebf3b7230765209b61eee5658

    SHA512

    feaa6e7ed7dda1583739b3e531ab5c562a222ee6ecd042690ae7dcff966717c6e968469a7797265a11f6e899479ae0f3031e8cf5bebe1492d5205e9c59690900

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    MD5

    7e6efa886884e54691fc60c90b842e14

    SHA1

    30aa9c61de876f0fadf8a8c069ab7c867c552d3c

    SHA256

    869ab3041a95764fda13d310bfe0b28ba0f444415f17496cf99d4d1076e4b8d5

    SHA512

    0bb892d2630276647e9cf36404fb3c1e878bc0cd010f78bd63d5836cd69bd32550bdc12a0308c4d94b9001153ef25996703a44825a37a74e680279794e68a728

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\RH1J5ZHF.txt
    MD5

    5f71474598cc0617bf122210f405d5da

    SHA1

    482bb9a9774894eebc45028a6a4442bd4bb37ba7

    SHA256

    18fafc61613ec0cf07355b915a888633b21f768d71bd61b651990a5c7a826adf

    SHA512

    ca7518b2ddea3fa5ccc6743d894eaad952dec205bd307820a490310cdc91c9d310a9d17786d580fa6375361a916225ed9569999b8f14e3be70f9b5bbb5e12b57

  • memory/1864-55-0x0000000000000000-mapping.dmp