Resubmissions

08-04-2024 14:56

240408-sa9z1sfc8z 1

Analysis

  • max time kernel
    192s
  • max time network
    194s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    08-04-2024 14:56

General

  • Target

    qaR9ZGt4AmR2Amp3Zmx4AwR4AGVkAvf.gif

  • Size

    43B

  • MD5

    325472601571f31e1bf00674c368d335

  • SHA1

    2daeaa8b5f19f0bc209d976c02bd6acb51b00b0a

  • SHA256

    b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

  • SHA512

    717ea0ff7f3f624c268eccb244e24ec1305ab21557abb3d6f1a7e183ff68a2d28f13d1d2af926c9ef6d1fb16dd8cbe34cd98cacf79091dddc7874dcee21ecfdc

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 32 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\qaR9ZGt4AmR2Amp3Zmx4AwR4AGVkAvf.gif
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:5000
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5000 CREDAT:82945 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1948

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157
    Filesize

    3B

    MD5

    8a80554c91d9fca8acb82f023de02f11

    SHA1

    5f36b2ea290645ee34d943220a14b54ee5ea5be5

    SHA256

    ca3d163bab055381827226140568f3bef7eaac187cebd76878e0b63e9e442356

    SHA512

    ca4b6defb8adcc010050bc8b1bb8f8092c4928b8a0fba32146abcfb256e4d91672f88ca2cdf6210e754e5b8ac5e23fb023806ccd749ac8b701f79a691f03c87a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157
    Filesize

    302B

    MD5

    d8bf519166ac72e769cee662a9423b24

    SHA1

    5a91c0e447c972ab36887c7fd2ecc190cb64c3da

    SHA256

    93b99eb4cd3f356a96afde12867672aa3d431b48c639ff2d982d50b5e3f158dc

    SHA512

    622335ab44ece22a82155d2957c189c7b3474b52bcbfb177a2ce72d1b146b3c0d69ed57401724cb6ccbdc926797183e2ee12e50d80b60b0f3df83f959cd33763

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157
    Filesize

    302B

    MD5

    231c8d2132bd730c420052b1fd5ffe53

    SHA1

    c043bd2c3da169f61c228dc0b7db8600fb48dfd0

    SHA256

    f27f5bda5d170a496957f1dfb46f8e0d655e14cf4d310de16cc271c90e5e44f2

    SHA512

    9da945beeb8f47360b2010078842bf0195a630c8486aba92cf8270afb01fba71662b48a69558d606bbdcdc9036c4148e3f42a33999d5944ad0efaeaff7407f38