Analysis

  • max time kernel
    124s
  • max time network
    167s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    24-03-2022 15:54

General

  • Target

    SkyBlade/ModTools/Scripts/TechnicalDocumentation/tool/mod/script/Meta.html

  • Size

    6KB

  • MD5

    ec9675e594b39be998c656fa6a995b39

  • SHA1

    f951fdb67da89d41138c6f195f76fc7482ea5573

  • SHA256

    287a28359f22b32787d23ce925ce60c626269019fa2f1bb05069e6b0ff082a44

  • SHA512

    bc031a0cbaac4dd745265af3dcc8d71eeda5577b322ebd5d3a2673c05212d47e43ab5bb880d807d06c8522cae66602959247eaf7bb345f4fa90222be01f66ce0

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\SkyBlade\ModTools\Scripts\TechnicalDocumentation\tool\mod\script\Meta.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2280
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2280 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2708

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    MD5

    dbf72784fc2dad614fa8cac21cccbf74

    SHA1

    ef07eb1c2a31d64401e1a6b12b49e3b3a2b5d28e

    SHA256

    54ea764e102ff6ff8e07082da488bb5504a4fe5400fdbdccffab18d1aa313886

    SHA512

    0bbc2e638e39b3da131783bce54e36ff671f399775af8faa316d480edc4edb214f116c078577825d5cc29520f8d660469d5a4a5d5c73bbc86c3255e172508d70

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    MD5

    c2d00e36a1254880a185871a2c010fb7

    SHA1

    24f099c224c153cd9a99d35a4b6209202e78b641

    SHA256

    93c21bb7866da83b358daf5cb8a057a039fa572a4616aefdf52a986a6cfa5cd9

    SHA512

    ebce1dc8a9d6d81f1399e81c07953300e51888e2fd1dd1cb20865ccd703ac62efe68e81c0191ea07ab4ae8a8f39a1a7c4015563454d979a4311b4203533e7d7a