Resubmissions

01-04-2022 12:57

220401-p7a1eabdg5 10

01-04-2022 12:56

220401-p6ra1affgl 4

01-04-2022 12:54

220401-p47vzafffk 4

Analysis

  • max time kernel
    79s
  • max time network
    158s
  • platform
    windows7_x64
  • resource
    win7-20220331-en
  • submitted
    01-04-2022 12:56

General

  • Target

    CristalixLauncher-3.0.145.exe

  • Size

    4.3MB

  • MD5

    25b608146d97e46e5cb8d5d4a77440c5

  • SHA1

    ed5d75d64744a971a7bdb79ba68f4eb0aa7d2cab

  • SHA256

    8504825018e604414d2ebb1093cf249c2f1d56125f6f33a20b071d6a008b8dd9

  • SHA512

    3ae601c91d804c4d6c402ba73263e5749fafdfe35d68d510dc3b632a85d897bb1dc0e48dee4710deaea5932bcf34deb9ca13d4c0c664848abca0372190fb38b9

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\CristalixLauncher-3.0.145.exe
    "C:\Users\Admin\AppData\Local\Temp\CristalixLauncher-3.0.145.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1988
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://java.com/download
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2004
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2004 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1700

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    7bcda47c29edd9b9b395f849efe98d00

    SHA1

    b63335f57b8efca772302f2c7892eea33e648472

    SHA256

    08c25bbc458de3046a1508e24dec4e1a264c5f2b996cef03b14c94b36aface1a

    SHA512

    7f42731010c7232ffbd90b16d615f6556a6a4146f9b4ce031888913add83c8aab68ab19037a901933533d9203f54b834c02e61c12b6b44fda78230a25e9843a5

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\b1rou5u\imagestore.dat
    Filesize

    5KB

    MD5

    15ebdd980d0896de3da6858eb652293f

    SHA1

    4cd25ebbefe88b2b7c2beb6fadd42ebf95486e52

    SHA256

    08e82493c41ac4ba98f9179a894aa3ed071a4519631f4e9a5d1539f97cbd9ae0

    SHA512

    ef85aed119000f509713b09d7338061efab92a0becabbbdeab383557d3bdd3c2c06b58eb558adf37ab0d60da6ce391edcb6beba61157c161b149c2be9dc81892

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\WDR4ZJ02.txt
    Filesize

    608B

    MD5

    fa43e640be219eb4698b274680bd1cc2

    SHA1

    2d29e8006c8374d678cda6f1b2a061437951d580

    SHA256

    a8649ef76352c1fdd58accb374aebdb33c1e97881d79359e33ce8a682641d9de

    SHA512

    b7ae61d939879bafbdece5666f5d326978bb1094315e2a1123706d96259b85caabe2ef0041d2b505c00ded896482987e4981fd9b9ef064e8f70b035131641334

  • memory/1988-54-0x0000000075D51000-0x0000000075D53000-memory.dmp
    Filesize

    8KB