Analysis

  • max time kernel
    91s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-10-2022 13:46

General

  • Target

    standby/preparedness.gif

  • Size

    16KB

  • MD5

    917b31c770e46374273b3ee246a0a1fe

  • SHA1

    e6509527a2694dd8d71a6ddd7348d7a266b36a23

  • SHA256

    73e05818855ea853d28cca8654ab826506f592ece120468dfde66fe1a7d82a67

  • SHA512

    f5f9177d7ab4bae9e3cdf82793d3c29dbdb8ec2c633da15aaa5a457ffe6080c0151ecb3d8f5e592aadcef677fbe63d388fe1eabab3602356baf0e5cfd8ed8e82

  • SSDEEP

    384:UPZ4VrmKVE8fMGj/1WmhqOeZbOahcLJw8lfJhzz9nCdo2s9:ECVrrVZj/EZKahcTnhzMmt9

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\standby\preparedness.gif
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4776
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4776 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:4532

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    Filesize

    471B

    MD5

    ceb27c5a4ddfb187c4249a72504c7c8e

    SHA1

    1ad64626e4164455d19d5f88ef582c4995bfde79

    SHA256

    f218ba665e9323513337c50a31c4c5ff4501e3c386477149e3964a760de327df

    SHA512

    ceb5d4a665b6835c39b7f2b2841f3ce8b10236f8bc37b1dc99b2182303363f7f3f5c25d6cf7a84e5fb541fe8988c4af6b86abdd0f3ed9f6ddaca0e8ce0a1e3a3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    Filesize

    434B

    MD5

    a04f283da5fa774c679fb3dd6e28ce05

    SHA1

    5eeffb656472811bb9c430019017bb553cc78279

    SHA256

    14add8c7c2506798f861f8ed9da67d5a0aa915fb20565b1eada68d26c3aa4782

    SHA512

    87a556ff93350175266e484ecd41c78888906902f80115a6492acf18124632400b560f6e8b55594150a1b481e9a337dea58082e5afbd98f1ad2e27075412e411