Resubmissions

17-03-2022 11:50

220317-nzwrgadcd8 10

17-03-2022 11:47

220317-nxz14sdcc9 10

17-03-2022 11:43

220317-nvn6tsbfar 10

17-03-2022 11:40

220317-nsw4nadcb7 1

17-03-2022 11:36

220317-nqrfdsbehp 10

17-03-2022 11:31

220317-nmv96sbegl 1

Analysis

  • max time kernel
    4294179s
  • max time network
    136s
  • platform
    windows7_x64
  • resource
    win7-20220310-en
  • submitted
    17-03-2022 11:47

General

  • Target

    https://1drv.ms/u/s!AnWE7BCdi_7hgxBogqt9g3XXAdK7?e=C53B24

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://1drv.ms/u/s!AnWE7BCdi_7hgxBogqt9g3XXAdK7?e=C53B24
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1764
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1764 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2028

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_711ED44619924BA6DC33E69F97E7FF63
    MD5

    cea765efc86786a2a30dc0827de4c3ab

    SHA1

    2203c7c34e00e3c50eca99c622bd821e7fd42380

    SHA256

    1b90da13d25cb28d6d05b7adf10279492d4ab4c8c6010d051ea70574d89943bf

    SHA512

    0f41097bc9ec6b05adc96ea9209e4dcb59aa52776da21bb4d3204171a88283a734c56ebbb553feab88d4ff68c67faaea47ef9668609d444461278dece7c843be

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_711ED44619924BA6DC33E69F97E7FF63
    MD5

    88aaa1abee2d5c387f4379f46c258cd1

    SHA1

    fb526ef7d802e57d397569bd3a5d80a7f4f30b0c

    SHA256

    976b0f829073bf2e34d5be8c4c58b38b4788b9feb1eb813e41ab20132c419867

    SHA512

    5b4afb14708d5b6445e305dad6890b3ae46a5f03666ae07085a597c4ce2ed9636a86a23c3abf90a7f7478a6b8da55acdf68b431d3278e42907c1225cfa934d5f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    MD5

    7dfa59fca85518c6e6b2747bf5c09e00

    SHA1

    b242044d1dadc92ea2d849016375a7c157645cd8

    SHA256

    21d8a7ea8bf7f7506a1e87dc30f07c29cec2628d22dcda29e8acfc6941fcdf0a

    SHA512

    4bd585a3678b11b624128b72d1a31a81c3968ebce707b967a0d71e26a2d72eac22640a1da75f03e085e272ff6c1988235cf6dfe71c2a2ed944e330c78838edf4

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\w8w9llr\imagestore.dat
    MD5

    03eeceecf5875d9948a55d1c12431c9d

    SHA1

    c10401369bb6bbdaff02d359ae69303996a7831f

    SHA256

    60025caff42df938dc89164a8884ddc3e158cfe5af93046f52c455458448229f

    SHA512

    2928f47744723ef0348ab9d7629dda48c11bc0d54b6b2d9445a508d602223261f5a131689f14de8f8598febe590531d61464001dea6095e7f4c99d80e904b096

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\AGS3ZD2N.txt
    MD5

    02767b8fb5c3c3a9392e23c231fc4de3

    SHA1

    46ea5cf3449a398bfeb4aa33d8a5ad25c4450185

    SHA256

    24cc064c40d0159bce4ae4fda8d2d0280e0ccb2b767cf1642aaa3e4facba6a94

    SHA512

    f3eaddec904c1815733605d1a1adfc9238600cfec706691eec3763fae26eb4e83b6d788e905eb401bc0b6df39dddd057c4930c6420dee7850ca61d344df34c8b