Analysis

  • max time kernel
    135s
  • max time network
    170s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    08-05-2022 22:31

General

  • Target

    Onedrives/Onedrive1/GC.htm

  • Size

    1KB

  • MD5

    c9211bfaab58c6d7e213068340eda4e3

  • SHA1

    9acf8f861ad96a6f14cbe2bfba34593bb3f42542

  • SHA256

    b6a2cb0f027f34738d1f794e166ff7d57ca7adcddfbe9c7a6822eea2d8cf43b2

  • SHA512

    476cc692e7fcb6d1b1adca7729b79b3d350f9d79ccca611339fa8a67153684ac6dd26cc3be555c7a8f8fb76353a03d4db8c6af4956d613a6efd99b87b7f6fb3f

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 58 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\Onedrives\Onedrive1\GC.htm
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4036
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4036 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2380

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    Filesize

    471B

    MD5

    e3ceb62a9896465e13c3b72f5b790d33

    SHA1

    48430ff0579a232e2036dc918ef0172c527d50f9

    SHA256

    3bbbbcdbe16f6d569d1e3a712d1902d46b2b7b667e9b034cdcdd80eaa5d48001

    SHA512

    b90f3edae41ef2fa395225ad76985d5465ca28a77353b381fbc2c4b2a8fc82cbb1632b9fe9b69294b63efd91de6a4498bda7b53bf5c7b922d7dd30447759af72

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    Filesize

    434B

    MD5

    4f1bad4d9993efd54706cfdd0f0b9af2

    SHA1

    0670c0ffd20671281eae99560ef52b57848401b8

    SHA256

    31e3102fbb085345fd6ad75794e339f5cf948682b100a344bcdd99c789caecfd

    SHA512

    60604aa87374058275e8b0022a67a204b20e9ea510118d01b8a9e585422fe7673a8970cc40c52190cf7f45619f0fb1121a7a486f4677a5fad971f0b898a1c85d