Resubmissions

26-09-2024 23:37

240926-3l63lstfmr 3

02-09-2024 20:39

240902-zfkqmswglm 10

Analysis

  • max time kernel
    35s
  • max time network
    32s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-09-2024 23:37

General

  • Target

    3dgifmaker63234.gif

  • Size

    267KB

  • MD5

    bcbc07c653758f78320d848c316c4670

  • SHA1

    5f71d39154823280999538171e66566a08bfe51f

  • SHA256

    0efef610a555393bf5661164a7f8c184b9f162a4a71e3be0070fb5aa3cdc0f06

  • SHA512

    095abf1540175a5807a65aeff4ea69ed09af5a595211724dce28d933f997fdf8a73dec9d1425997f20cbf5300038fffbeebeb10bf02537c8f5cf40fc051ec678

  • SSDEEP

    6144:SI62dlleAYK6Oj6GZTEdTw0RMylnzyqcwrQC:Sh24KZZ5uRxxd

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious behavior: EnumeratesProcesses 33 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 44 IoCs
  • Suspicious use of SendNotifyMessage 42 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3dgifmaker63234.gif
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1068
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1068 CREDAT:17410 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1660
  • C:\Windows\system32\taskmgr.exe
    "C:\Windows\system32\taskmgr.exe" /4
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:4800

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    02f97850a7cbc788eaa63ca9980845e6

    SHA1

    c7bc23d160f6603b590bb7d1ff5700d37add3be6

    SHA256

    d48ed68a99ace2d38001d542f7c8b9594a6d7d6c95c35de6c9d0b888ca035916

    SHA512

    c15716832f1a4c0f577bcaee0140d6fe542882e88adcf1c61566d25282b2d15f6bbe187d0361334aa05e494bac6fffc241d3a330d3c0a958464b7be75749608b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    404B

    MD5

    87c03a91a4aff3ffc45476a2f0afda88

    SHA1

    6483276b6772aece77c9905d55e564fc8db59d99

    SHA256

    b4ed5df0754d1a1984669f3e58c773d10e1e6bf2fee766d488580c3f81784a83

    SHA512

    5b99737b88313a6d1351acdd6999799b6a90e08488c1c9ad8bc327b00a5f076b5f65c0fc7f13b7954d0276dedb874d280cdb4d2e9a5242d3f8025da0e3250ea3

  • memory/4800-0-0x0000021837960000-0x0000021837961000-memory.dmp

    Filesize

    4KB

  • memory/4800-12-0x0000021837960000-0x0000021837961000-memory.dmp

    Filesize

    4KB

  • memory/4800-11-0x0000021837960000-0x0000021837961000-memory.dmp

    Filesize

    4KB

  • memory/4800-10-0x0000021837960000-0x0000021837961000-memory.dmp

    Filesize

    4KB

  • memory/4800-9-0x0000021837960000-0x0000021837961000-memory.dmp

    Filesize

    4KB

  • memory/4800-8-0x0000021837960000-0x0000021837961000-memory.dmp

    Filesize

    4KB

  • memory/4800-7-0x0000021837960000-0x0000021837961000-memory.dmp

    Filesize

    4KB

  • memory/4800-6-0x0000021837960000-0x0000021837961000-memory.dmp

    Filesize

    4KB

  • memory/4800-2-0x0000021837960000-0x0000021837961000-memory.dmp

    Filesize

    4KB

  • memory/4800-1-0x0000021837960000-0x0000021837961000-memory.dmp

    Filesize

    4KB