Analysis

  • max time kernel
    115s
  • max time network
    190s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    24-03-2022 15:54

General

  • Target

    SkyBlade/ModTools/Scripts/TechnicalDocumentation/tool/mod/script/ExitNode.html

  • Size

    31KB

  • MD5

    e7abfa09bbeed2f944c4103a9bf98acc

  • SHA1

    ec1d7c75f2b2bb3f0790ee44a98a004df9c62bfb

  • SHA256

    562404ce99c0a2163f9f59fcdf1579361b9bad14ddd5645c4e9eafd7cc64ee3c

  • SHA512

    bd24a38777fe6689ec50604a833dcb20d8aaf624f7d037533435c386f7016f5f3b1e2ce0620d7efd3d04f7ba3fcce392af7748e3f582f0842db90719d32c0dc3

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\SkyBlade\ModTools\Scripts\TechnicalDocumentation\tool\mod\script\ExitNode.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4496
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4496 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:4056

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    MD5

    dbf72784fc2dad614fa8cac21cccbf74

    SHA1

    ef07eb1c2a31d64401e1a6b12b49e3b3a2b5d28e

    SHA256

    54ea764e102ff6ff8e07082da488bb5504a4fe5400fdbdccffab18d1aa313886

    SHA512

    0bbc2e638e39b3da131783bce54e36ff671f399775af8faa316d480edc4edb214f116c078577825d5cc29520f8d660469d5a4a5d5c73bbc86c3255e172508d70

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    MD5

    523c3fe8854fa90774d356144204b09d

    SHA1

    f150565999f8820f47ff1952bdb1e3f6efd3c268

    SHA256

    0c22aa25c152fa563cff0a11be9929fddfaaf05bbdcd733112f2469804d2efb2

    SHA512

    2e5d3e2de41a0e2e83b66be1fbf85d68d4c0d6a83c9bf1ffb4ebc3ae02569712eb52bf883dbb66e6f63b2be29975f88bc5b12e06ae9108652d84a6cfbb71a975