Analysis

  • max time kernel
    166s
  • max time network
    188s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    24-03-2022 15:54

General

  • Target

    SkyBlade/ModTools/Scripts/TechnicalDocumentation/tool/mod/script/SeededRandom.html

  • Size

    6KB

  • MD5

    228220fc23b7a980df7c9768607f6fed

  • SHA1

    4b2303fad36dcfa29a0ff7a5c6fd9269bdda4e61

  • SHA256

    0e43e137d02b835fd2a5633a16ff0defc3027f019286b84ee94fc80ee36f7f32

  • SHA512

    43c8d4006da7690ea3999936be4e697a58212008daa1074434c82e1112c51373ebc88460628b3d12c681520ec5598da2a8e90b5837b82b5e952ee53276ceda29

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 41 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\SkyBlade\ModTools\Scripts\TechnicalDocumentation\tool\mod\script\SeededRandom.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2216
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2216 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1592

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    MD5

    dbf72784fc2dad614fa8cac21cccbf74

    SHA1

    ef07eb1c2a31d64401e1a6b12b49e3b3a2b5d28e

    SHA256

    54ea764e102ff6ff8e07082da488bb5504a4fe5400fdbdccffab18d1aa313886

    SHA512

    0bbc2e638e39b3da131783bce54e36ff671f399775af8faa316d480edc4edb214f116c078577825d5cc29520f8d660469d5a4a5d5c73bbc86c3255e172508d70

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    MD5

    0c2e13c2f8693489467fd11abac99b75

    SHA1

    44389a80b0b86767fb336dc3f0fbc9cc86bc690c

    SHA256

    615b6433de535bfe1a461437e1af1456e32034c09c53eed73b849bda51bccba3

    SHA512

    9ca156cf9a690923f5b5905705d38f81387d1a00b9851e35c071afd6d748ac12188ca0a4316785fefbb0477d9d62fe89d33146a405de8fe8f1af590c8834a47b