Analysis

  • max time kernel
    144s
  • max time network
    149s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    13-01-2022 10:14

General

  • Target

    PerformanceReview.html

  • Size

    1.1MB

  • MD5

    08287096d731608c6d79e58d5ec6db23

  • SHA1

    a9e51f4649739bf75740fc9f755563cbe3780bfa

  • SHA256

    1eca90b11008621f5ce811ec2af5df1bf277162ddcbb217302d36e8fab4b313e

  • SHA512

    30cd4b79f95cfceb3556f7251ba7ff04037dc17b3c5a2cd15db22dc5103de3ee59924e48c51558f9585ffe96f7ff6f5b947e65d525b4ccea9c268c7a7b8ec8c1

Malware Config

Signatures

  • Cobaltstrike

    Detected malicious payload which is part of Cobaltstrike.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 51 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:2896
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\PerformanceReview.html
        2⤵
        • Modifies Internet Explorer Phishing Filter
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:856
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:856 CREDAT:82945 /prefetch:2
          3⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1408
        • C:\Windows\SysWOW64\mshta.exe
          "C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\Downloads\PerformanceReview-v20220101.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}
          3⤵
          • Suspicious use of NtCreateUserProcessOtherParentProcess
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1528
      • C:\Windows\SysWOW64\WerFault.exe
        "C:\Windows\System32\WerFault.exe"
        2⤵
          PID:3128

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Defense Evasion

      Modify Registry

      2
      T1112

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
        MD5

        5101ccedaac0e998d2260c800e967333

        SHA1

        1da450d76622c6db3625653d0c65a480a86fe704

        SHA256

        fbcc424fea0cbb6c7eed2e84d6e05a05d639315fd903530eb151103a9f723ebd

        SHA512

        a0d2d3f0239a7d64bb3b74fc2b3c2d83c591e39fbc6008ef67ac0de2bf69156994b18ed433b7dae3bfbe18237cc443617259acc7ee9dae8c4f365b80ed8b4a0f

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
        MD5

        7ea48d2dc27288d99ae3c9a6a607998f

        SHA1

        7925ae7c9d559ec036a9721bde22bc7594d6878d

        SHA256

        faab39e03778d2172c8abe58a6584e2669069e7191e3589f36b3b9abf55c2413

        SHA512

        1f21f70487b5e6913b46ea5448e6f3502b9f9699c3cf4ec319718714ccc6a058c6a08239542c348a9d956bbc08402f884d0ecb9b22ceffa24be192884762dc45

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\545W4OEW.cookie
        MD5

        33c6af6db7402656b27c64ad6c7b72f0

        SHA1

        2e4eba450afb3db313a5ba5fb60e9c30a43a7a12

        SHA256

        c7b66dca34324d734e0906beba24633a32f50453a517dc2cf1c5db762450bd18

        SHA512

        ad831ba2e9159a0d36673e9c981264b04c784709a39c1c7d5d56845e5fd41a94eb133ba687f0a78095d5ce703adf4c3f1a6266c4535fb3c3d6ec5ef792e1f45d

      • C:\Users\Admin\Downloads\PerformanceReview-v20220101.hta.yousfoe.partial
        MD5

        160b7d982e3526a09e202f0d61b3fdfa

        SHA1

        73db938ca6749ce32e7b64e18d80551876e2d291

        SHA256

        f38bd16013de4b9da3603b2425173db9bcc1865f381351b2ba62fdeeb6d5af00

        SHA512

        d51c9f2bf74b9551f088ec3830c385001012f37ef76fc5e33335374ad1832fc486cc4341d9f89e6233e7a197b97c6b49cf0744191dae2706188d03206b5a2b69

      • memory/856-143-0x00007FF8FF9A0000-0x00007FF8FFA0B000-memory.dmp
        Filesize

        428KB

      • memory/856-168-0x00007FF8FF9A0000-0x00007FF8FFA0B000-memory.dmp
        Filesize

        428KB

      • memory/856-119-0x00007FF8FF9A0000-0x00007FF8FFA0B000-memory.dmp
        Filesize

        428KB

      • memory/856-120-0x00007FF8FF9A0000-0x00007FF8FFA0B000-memory.dmp
        Filesize

        428KB

      • memory/856-121-0x00007FF8FF9A0000-0x00007FF8FFA0B000-memory.dmp
        Filesize

        428KB

      • memory/856-122-0x00007FF8FF9A0000-0x00007FF8FFA0B000-memory.dmp
        Filesize

        428KB

      • memory/856-123-0x00007FF8FF9A0000-0x00007FF8FFA0B000-memory.dmp
        Filesize

        428KB

      • memory/856-124-0x00007FF8FF9A0000-0x00007FF8FFA0B000-memory.dmp
        Filesize

        428KB

      • memory/856-125-0x00007FF8FF9A0000-0x00007FF8FFA0B000-memory.dmp
        Filesize

        428KB

      • memory/856-127-0x00007FF8FF9A0000-0x00007FF8FFA0B000-memory.dmp
        Filesize

        428KB

      • memory/856-128-0x00007FF8FF9A0000-0x00007FF8FFA0B000-memory.dmp
        Filesize

        428KB

      • memory/856-129-0x00007FF8FF9A0000-0x00007FF8FFA0B000-memory.dmp
        Filesize

        428KB

      • memory/856-131-0x00007FF8FF9A0000-0x00007FF8FFA0B000-memory.dmp
        Filesize

        428KB

      • memory/856-132-0x00007FF8FF9A0000-0x00007FF8FFA0B000-memory.dmp
        Filesize

        428KB

      • memory/856-134-0x00007FF8FF9A0000-0x00007FF8FFA0B000-memory.dmp
        Filesize

        428KB

      • memory/856-135-0x00007FF8FF9A0000-0x00007FF8FFA0B000-memory.dmp
        Filesize

        428KB

      • memory/856-146-0x00007FF8FF9A0000-0x00007FF8FFA0B000-memory.dmp
        Filesize

        428KB

      • memory/856-137-0x00007FF8FF9A0000-0x00007FF8FFA0B000-memory.dmp
        Filesize

        428KB

      • memory/856-138-0x00007FF8FF9A0000-0x00007FF8FFA0B000-memory.dmp
        Filesize

        428KB

      • memory/856-140-0x00007FF8FF9A0000-0x00007FF8FFA0B000-memory.dmp
        Filesize

        428KB

      • memory/856-116-0x00007FF8FF9A0000-0x00007FF8FFA0B000-memory.dmp
        Filesize

        428KB

      • memory/856-145-0x00007FF8FF9A0000-0x00007FF8FFA0B000-memory.dmp
        Filesize

        428KB

      • memory/856-150-0x00007FF8FF9A0000-0x00007FF8FFA0B000-memory.dmp
        Filesize

        428KB

      • memory/856-148-0x00007FF8FF9A0000-0x00007FF8FFA0B000-memory.dmp
        Filesize

        428KB

      • memory/856-136-0x00007FF8FF9A0000-0x00007FF8FFA0B000-memory.dmp
        Filesize

        428KB

      • memory/856-151-0x00007FF8FF9A0000-0x00007FF8FFA0B000-memory.dmp
        Filesize

        428KB

      • memory/856-152-0x00007FF8FF9A0000-0x00007FF8FFA0B000-memory.dmp
        Filesize

        428KB

      • memory/856-156-0x00007FF8FF9A0000-0x00007FF8FFA0B000-memory.dmp
        Filesize

        428KB

      • memory/856-157-0x00007FF8FF9A0000-0x00007FF8FFA0B000-memory.dmp
        Filesize

        428KB

      • memory/856-158-0x00007FF8FF9A0000-0x00007FF8FFA0B000-memory.dmp
        Filesize

        428KB

      • memory/856-164-0x00007FF8FF9A0000-0x00007FF8FFA0B000-memory.dmp
        Filesize

        428KB

      • memory/856-165-0x00007FF8FF9A0000-0x00007FF8FFA0B000-memory.dmp
        Filesize

        428KB

      • memory/856-166-0x00007FF8FF9A0000-0x00007FF8FFA0B000-memory.dmp
        Filesize

        428KB

      • memory/856-167-0x00007FF8FF9A0000-0x00007FF8FFA0B000-memory.dmp
        Filesize

        428KB

      • memory/856-117-0x00007FF8FF9A0000-0x00007FF8FFA0B000-memory.dmp
        Filesize

        428KB

      • memory/856-169-0x00007FF8FF9A0000-0x00007FF8FFA0B000-memory.dmp
        Filesize

        428KB

      • memory/856-173-0x00007FF8FF9A0000-0x00007FF8FFA0B000-memory.dmp
        Filesize

        428KB

      • memory/856-174-0x00007FF8FF9A0000-0x00007FF8FFA0B000-memory.dmp
        Filesize

        428KB

      • memory/856-179-0x00007FF8FF9A0000-0x00007FF8FFA0B000-memory.dmp
        Filesize

        428KB

      • memory/856-180-0x00007FF8FF9A0000-0x00007FF8FFA0B000-memory.dmp
        Filesize

        428KB

      • memory/856-115-0x00007FF8FF9A0000-0x00007FF8FFA0B000-memory.dmp
        Filesize

        428KB

      • memory/1408-141-0x0000000000000000-mapping.dmp
      • memory/1528-197-0x0000000000000000-mapping.dmp
      • memory/1528-205-0x0000000008070000-0x0000000008071000-memory.dmp
        Filesize

        4KB

      • memory/1528-209-0x0000000008072000-0x0000000008073000-memory.dmp
        Filesize

        4KB

      • memory/3128-207-0x0000000000000000-mapping.dmp