Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-1703_x64
  • resource
    win10-20220901-en
  • resource tags

    arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system
  • submitted
    06/02/2023, 19:01

General

  • Target

    barra_multicolor_1_discord.gif

  • Size

    26KB

  • MD5

    27cbb21c157a3fcc08b264a4597e8931

  • SHA1

    5a5af40cf7173d3522fd890877c8453e5e967aaf

  • SHA256

    cc62b6597a7263478f64d457e7b4b0d4868b15322841aa251fb25bbdc19b090d

  • SHA512

    620ac43e1cd0db6dff3892b901380c68c9915e5abaddf0bb1cb67203fc8c2bc85d2c261d83bd7493f638e435219545455f6e89d7cbafc8410c06064fa5008b79

  • SSDEEP

    768:r7WGAbCHjchIkxosUU5z1VUNITaFn1RrQES:KbCDchIkCg1GNKaF1RrM

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 5 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 51 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 19 IoCs
  • Suspicious use of SendNotifyMessage 17 IoCs
  • Suspicious use of SetWindowsHookEx 53 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\barra_multicolor_1_discord.gif
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1408
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1408 CREDAT:82945 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:4696
  • C:\Program Files\Mozilla Firefox\firefox.exe
    "C:\Program Files\Mozilla Firefox\firefox.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4960
    • C:\Program Files\Mozilla Firefox\firefox.exe
      "C:\Program Files\Mozilla Firefox\firefox.exe"
      2⤵
      • Checks processor information in registry
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4048
      • C:\Program Files\Mozilla Firefox\firefox.exe
        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4048.0.1814280837\975526739" -parentBuildID 20200403170909 -prefsHandle 1548 -prefMapHandle 1540 -prefsLen 1 -prefMapSize 219987 -appdir "C:\Program Files\Mozilla Firefox\browser" - 4048 "\\.\pipe\gecko-crash-server-pipe.4048" 1628 gpu
        3⤵
          PID:2108
        • C:\Program Files\Mozilla Firefox\firefox.exe
          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4048.3.637931590\1959377609" -childID 1 -isForBrowser -prefsHandle 2288 -prefMapHandle 2256 -prefsLen 220 -prefMapSize 219987 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 4048 "\\.\pipe\gecko-crash-server-pipe.4048" 2236 tab
          3⤵
            PID:2536
          • C:\Program Files\Mozilla Firefox\firefox.exe
            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4048.13.194108785\2082900637" -childID 2 -isForBrowser -prefsHandle 3512 -prefMapHandle 3508 -prefsLen 6938 -prefMapSize 219987 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 4048 "\\.\pipe\gecko-crash-server-pipe.4048" 3496 tab
            3⤵
              PID:4176

        Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

                Filesize

                471B

                MD5

                aee722fcdc90fcfba473126bf8bed12b

                SHA1

                df62a695b671a248b19f76cd6d420d1bcee9c27d

                SHA256

                e759250bcfe36a1a745bc1cc241dea84b6c791141e93b322bd5027d62d3a4807

                SHA512

                e51c09b66f06f247289841147cc6ebf2b70308cfac2c500915ed2b4775813e48422e60779e50351ac668bab548afaccb822a1486ae8242bc37697f16f3a994cf

              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

                Filesize

                404B

                MD5

                0a29e7f0a5d9daeab93298274ca9e3dc

                SHA1

                a604a5d4bf5c7bfc943248677fa6eed2ee3e4be0

                SHA256

                7b5cac6c3bcbe742fe6f40c72a34d599a0fe048ff1d68a78f34faa6b5c0554a0

                SHA512

                7bed0bdc1cad9d990c0394f77fa152f6d182c406456cb8f43eec31ee35dc92bbeaef6aaae56a68cf128fc0d647aaf9b538661d9f5c7b248f9069fc7c813e3164

              • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\MOCQ6M0M.cookie

                Filesize

                614B

                MD5

                49dfcfdd2be68247e08ec17658d398b4

                SHA1

                af28fe197bc3b6c700be8031b176b32ea6ef36fd

                SHA256

                ecd30a9bdbbfb35566293b3c6c21ecebc851395c28c0db8da231844704036a34

                SHA512

                dc3d485cd7a3298cb7e5bf38a607c8043d5fb9849be0b248b3c30e22c177f8ee912782e8467c31059d9807b6e62f8aff055ab25c130a7cfe83f5d0340daa28e6