Analysis

  • max time kernel
    132s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    14-04-2022 13:39

General

  • Target

    SkyBlade/ModTools/Scripts/TechnicalDocumentation/index.html

  • Size

    3KB

  • MD5

    f588e93768556e1043c11f1385056395

  • SHA1

    604cd2cc502d4d3e3d4fcd802e3f1b777b3f9294

  • SHA256

    35ecc9bc5fc2316732cfc2d53af352e150d39ec6f09ff575f1dec1aa23c48765

  • SHA512

    4b43e5e1171762caec221e21cda6a9001a96709dad23825f6bc07e3ae4204d964a6017f1ea15269f6e8772b1becd0a3cac37b7cc9d5e5cd4217ac721ee418827

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\SkyBlade\ModTools\Scripts\TechnicalDocumentation\index.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2136
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2136 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2764

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    Filesize

    471B

    MD5

    0bc7f0d8dd0626f21a69e573e7ec41be

    SHA1

    6252061964b3ef4c1cf4fb19daa0483778c5fb58

    SHA256

    df2cda4e008208fe04752874dd20b99870a3a748e6c404d4df642afbf3b9237b

    SHA512

    a69fcf352ba20b8e980cd36375baf1e4e7249a22cfbd51891c24c43760c1b3775c4503750d53f276997cb6030cb0a679603fa4f61245a9effb742b31147f0aec

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    Filesize

    434B

    MD5

    aae088d71f40d63d73efb4dd76ffb09c

    SHA1

    8ff06fb37435a97e107fc3cb5b1e1b7a63c8ef1d

    SHA256

    926d9a65e5c69f86e85cefcd9ebe63f41537b5fd25e16730b41d89f22904d76f

    SHA512

    f5981518f8c921f787ab5fe9253c2c4ef4e83cbdfe9754a1ed2975c8e54c1f0c93f3f407cd8169c5d8790287e5a6ba84145f4ea720b528d74ad096982b720ab5