Analysis

  • max time kernel
    149s
  • max time network
    164s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    26-04-2022 13:51

General

  • Target

    Admin panel v9.1.1/www/GeoIP/index.html

  • Size

    144B

  • MD5

    83667fe64dc25693d6a95183bd264d1e

  • SHA1

    c02f117b8ae2ad965a82b4f68604dea052c84ca5

  • SHA256

    d63a65cc2e7c4d99a80e905b159e38c27705ecc4a07b1d733bf5b1d3a4ebeed3

  • SHA512

    0e1267310ccdb40266819f44090254e609788718debed5b9f4f3cb682b3a2d46a7a28880bebf58f15c6848c8485eb9f7d30398c0a3de4cb5404aea60de33784f

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 58 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" "C:\Users\Admin\AppData\Local\Temp\Admin panel v9.1.1\www\GeoIP\index.html"
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2068
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2068 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1232
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k appmodel -p -s camsvc
    1⤵
      PID:2392

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

      Filesize

      471B

      MD5

      bc1a2865950b5f6c4dd6da279ae7ed22

      SHA1

      c7ece1399a334554b438e6119482bf8e2934e340

      SHA256

      6d529e805dcf3d5f9555c0379835b2cdb3476423f5310d892025ecc5d27f6893

      SHA512

      aeebaf16a76dc55e7ba914046d76250bd8a3693ba0f63ae927b67fb65c802c915b1e040f68cda3fa7f5e49ceb108fdef1ecda196ecd6eceeca32c76cc224af5a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

      Filesize

      434B

      MD5

      dc730f2dcdb0135a32532906a9bca3d3

      SHA1

      748eeb64ad08a313620cdda2dce48b93500803bc

      SHA256

      6d9a674d94b7ac0e5b95f76a6a13b6640f54df7c1ecce2dbe93512fa1295cbe3

      SHA512

      ff210e133d8ddd3e013352c5aaf3bbc117e7b261a238979966e507e98f3c67e2e1adac9792866ebb7bc5d9694b90fcf992b405043d03ba21fc1fa580da592af4