Analysis

  • max time kernel
    149s
  • max time network
    186s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    04-06-2022 15:13

General

  • Target

    beacon.gif

  • Size

    43B

  • MD5

    fc94fb0c3ed8a8f909dbc7630a0987ff

  • SHA1

    56d45f8a17f5078a20af9962c992ca4678450765

  • SHA256

    2dfe28cbdb83f01c940de6a88ab86200154fd772d568035ac568664e52068363

  • SHA512

    c87bf81fd70cf6434ca3a6c05ad6e9bd3f1d96f77dddad8d45ee043b126b2cb07a5cf23b4137b9d8462cd8a9adf2b463ab6de2b38c93db72d2d511ca60e3b57e

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\beacon.gif
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1832
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1832 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1536

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\KKWS4UCX.txt

    Filesize

    603B

    MD5

    38946a55e73e7618a916e68f4cfb64fd

    SHA1

    8a05a64fa174517982e2f39598635bd259ed44cd

    SHA256

    2b62d6d0d7e0fc7f7badf701dedc595c9c6bb40346d3a530a0f63b2d96a2d56b

    SHA512

    5f37b7ab49168e3a63e6a5530d84d7cff5cfc8953222abe14f6e8d0f0c360aee0115946f27030d8cca84f90ee252ef61169b0348b8ff3c397d836be9e1877e11