Analysis

  • max time kernel
    91s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-10-2022 01:25

General

  • Target

    standby/preparedness.gif

  • Size

    16KB

  • MD5

    917b31c770e46374273b3ee246a0a1fe

  • SHA1

    e6509527a2694dd8d71a6ddd7348d7a266b36a23

  • SHA256

    73e05818855ea853d28cca8654ab826506f592ece120468dfde66fe1a7d82a67

  • SHA512

    f5f9177d7ab4bae9e3cdf82793d3c29dbdb8ec2c633da15aaa5a457ffe6080c0151ecb3d8f5e592aadcef677fbe63d388fe1eabab3602356baf0e5cfd8ed8e82

  • SSDEEP

    384:UPZ4VrmKVE8fMGj/1WmhqOeZbOahcLJw8lfJhzz9nCdo2s9:ECVrrVZj/EZKahcTnhzMmt9

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\standby\preparedness.gif
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4428
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4428 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:4744

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    Filesize

    471B

    MD5

    9ebd7a0345cc0e64adb3c109997a2c1a

    SHA1

    76ebba7d659452c2f3cd86b589dfd82fc73afddb

    SHA256

    43f974eae1ff849eb1ba9afc5c73ec9a5f1b32aa7c07c0f9124f9a320ac76ac5

    SHA512

    ebe08af1f17b7d31e388136734618c3a4f46433dca14bb95fa0cd8b7c80f543e09f42013d925bf7c872ab0ecd7d3b12a81f265bd6c486b189910722e052ed6fa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    Filesize

    434B

    MD5

    c26581f9a45d7f1ba6033b5129dfe165

    SHA1

    08cfa0149a69906bcf974d8105a86d4f7782bb98

    SHA256

    11d4349aa4d64476e4add5634e13eba58cd559f876848ae05ec9f7b7b068d5cb

    SHA512

    715fb95fd85d5423c8603b65c60584d8be2774b2f11c17ad7c8df941af1884c3b9bdec9de88806536dd397c458406f521f1edd7b47f3a275d977590a9ff82c6f