Analysis

  • max time kernel
    136s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    26-04-2022 13:51

General

  • Target

    Admin panel v9.1.1/www/Template/index.html

  • Size

    132B

  • MD5

    c077ebf3827d001c3317ef6ba0fe21b9

  • SHA1

    2a3aea9ca11a9aa4314d89d5e5d1340112d0bbd7

  • SHA256

    3aac856de8207c89ecccb90a0b78175f680c3125d4a3c72a5bd0423e581cc472

  • SHA512

    a82ff660b94151a36794670d27595c8e9882a570cbbc51c481eb9e4008a8f06093bcff8f9e0a3770fb0337c1617fcfb1b57049c8ea9016ec745b439e7566023f

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 58 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" "C:\Users\Admin\AppData\Local\Temp\Admin panel v9.1.1\www\Template\index.html"
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2420
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2420 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1072
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k appmodel -p -s camsvc
    1⤵
      PID:1672

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

      Filesize

      471B

      MD5

      bc1a2865950b5f6c4dd6da279ae7ed22

      SHA1

      c7ece1399a334554b438e6119482bf8e2934e340

      SHA256

      6d529e805dcf3d5f9555c0379835b2cdb3476423f5310d892025ecc5d27f6893

      SHA512

      aeebaf16a76dc55e7ba914046d76250bd8a3693ba0f63ae927b67fb65c802c915b1e040f68cda3fa7f5e49ceb108fdef1ecda196ecd6eceeca32c76cc224af5a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

      Filesize

      434B

      MD5

      5bdf7341b5bc5fbaede4288ad4fee0d1

      SHA1

      5183df1d10ff176b5c6219e2bf27f4d533b08a41

      SHA256

      9bcf96948a1f4947c48e61af93c5179da374fde69792f04b716dec15ed7f8f4a

      SHA512

      20b5edbc9f6658d19e539260bfdaa1048d1f3382f1bd6f1bbcf052432cfe188ad167b5e161928b59f1ecc3020dd997e54f86e75318c24b1cca74b37082d2850f