Resubmissions

11-11-2021 15:33

211111-szbhrabed3 6

11-11-2021 14:04

211111-rdm4zsgebq 1

Analysis

  • max time kernel
    118s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-en-20211104
  • submitted
    11-11-2021 15:33

Errors

Reason
Machine shutdown

General

  • Target

    ATT0002644.htm

  • Size

    429B

  • MD5

    9d950526df17880d6dd9a2c062460514

  • SHA1

    6ba6d639957de2090e11c846267b16f1f653069b

  • SHA256

    43fcc0500664221ce892a5ce713e27935b478389e463e8bc209880960acbdd83

  • SHA512

    f08731f68ad62fd50398bf0bd66d602700f2f2b53bc4fae9412cc0eb7494419eeb13d439733d2f49c67ce93214a96c8027e4170bb9ef36beccacd545e80af157

Score
5/10

Malware Config

Signatures

  • Detected potential entity reuse from brand microsoft.
  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 15 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ATT0002644.htm
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:976
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:976 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:880
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:976 CREDAT:209975 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1612
  • C:\Windows\system32\LogonUI.exe
    "LogonUI.exe" /flags:0x0
    1⤵
      PID:904
    • C:\Windows\system32\AUDIODG.EXE
      C:\Windows\system32\AUDIODG.EXE 0x450
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1928
    • C:\Windows\system32\LogonUI.exe
      "LogonUI.exe" /flags:0x1
      1⤵
        PID:1232

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Defense Evasion

      Modify Registry

      1
      T1112

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
        MD5

        6d9fa0b709f9eddc1a2ae5393eea76f5

        SHA1

        4ad4a0c70eb180949acf3c2c1fbfafad4506fd0f

        SHA256

        28b1ac57019df9cf1f10e414c59a425dd3a8cbb4b45a733404689649d2b67d61

        SHA512

        bef3c3a4e1671ac2c66c49e418170e409df5d4e3f93227ba638cd08b43fb566d3ab20a7325e9ab3c0575bfe8a31cc337feb7cf3a241f8bd4c0952c70c57f4bb8

      • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\01ppg24\imagestore.dat
        MD5

        9e892114c5aa07fbce6c1b46ae18ab7c

        SHA1

        a3344bb6e09bd41b0b2b863e37f32560290e9cf9

        SHA256

        c7187d9632b601e955ac155599be202ebca142c0c6c4969d79fc8f64d33a46e6

        SHA512

        61b334d1f29780a6d9441e3286332dce4e369ed65d1e46e89de7c6f1e78df5ea098644d24a900657801a45de6a9e77383b3744577f56f5ae0b369654a8f0b72d

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\8QLR9YDU.txt
        MD5

        d059f0b45aa465e279695689ac988e55

        SHA1

        74d840dcf506dc880a4ee85647b98564471593ac

        SHA256

        57a571722dfb4fe30e8ebfa62ec8930a1e4cfc4e6432af054ab77c18e07c4978

        SHA512

        9d6f91f5145c28bac6d5e5898c9dee02f7f22e15d523dc4b658b38c4df12f814e1edb9a48a89145526f048867e9ba8f9286b9146f67e40ec0b96f85cff39d9c5

      • memory/880-55-0x0000000000000000-mapping.dmp
      • memory/904-65-0x00000000027C0000-0x00000000027C1000-memory.dmp
        Filesize

        4KB

      • memory/976-57-0x00000000052B0000-0x00000000052B1000-memory.dmp
        Filesize

        4KB

      • memory/1232-67-0x00000000026D0000-0x00000000026D1000-memory.dmp
        Filesize

        4KB

      • memory/1612-58-0x0000000000000000-mapping.dmp
      • memory/1612-59-0x000007FEFBC61000-0x000007FEFBC63000-memory.dmp
        Filesize

        8KB

      • memory/1612-60-0x00000000024B0000-0x00000000024B1000-memory.dmp
        Filesize

        4KB

      • memory/1612-61-0x0000000007720000-0x0000000007721000-memory.dmp
        Filesize

        4KB