Analysis

  • max time kernel
    150s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/11/2022, 01:36

General

  • Target

    http://www.dnp.info

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 5 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 58 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http://www.dnp.info
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3704
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3704 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:3780
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:3704 CREDAT:82950 /prefetch:2
      2⤵
      • Checks processor information in registry
      • Enumerates system info in registry
      • Modifies Internet Explorer settings
      PID:2072
  • C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe
    C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe
    1⤵
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1700

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    d84d4b6ec3847b0778e7d3d4f5aefe44

    SHA1

    fd32f06a99845a434b5bc3c497e5145b7a59953a

    SHA256

    239d44ce5ec4f3a6a64710b589d80e24a0df32ffee440c9cd48920332b79ab70

    SHA512

    3902a4938872f305c780bcf0a7a5dd7c7e33e935f6c98b27d1b6e6ba9d329f03ff016dd481b3fc4e39170ac527b546c1772610e3e7733c927d08a9b9300abceb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    434B

    MD5

    488a5d251d3537fb0855d2d3b5f880bf

    SHA1

    430038e626f4585ef23a875c5ef73b560d42b119

    SHA256

    488257087881b1d40c8419db05ee3499474e13a2a1d783209c7691da7f7e4314

    SHA512

    e0daf1f85e033585798dfa5d2dcbc03c64be06a07cfa2e54439902580db0555a6aea6fe68985bba062247a786c002ea83808210779db2267737d1889718c6ee5

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\ckj4gk4\imagestore.dat

    Filesize

    2KB

    MD5

    3564ee541012aaa56d9f810454d6b08d

    SHA1

    fcf17dfe86e2735263ea7105f88af6614006ef59

    SHA256

    0e6c9c44992a67eef8a8a2840b95451b0227e8b573430bd179edfdd3929060bf

    SHA512

    7e2915da1006c7e1407ae86ca9b9d8e890c363ef7064d5f7720e57bc4e9ae820c54abafcc0ab9f45b55546706040ea96a64ec73a06330a97910a898db7bcb9e0