Analysis

  • max time kernel
    182s
  • max time network
    266s
  • platform
    windows7_x64
  • resource
    win7-20220331-en
  • submitted
    13-04-2022 00:45

General

  • Target

    onlinedocumentation.url

  • Size

    61B

  • MD5

    878dd1f05f73ef7c4701564992f85953

  • SHA1

    6a761b0e64d50b36c70047c36efc24b88a6f71f5

  • SHA256

    b6bd8bad56285a8317351e36c40986946d44ee6d1fce6e4d84c5e736079bc32c

  • SHA512

    c8bb9f1e801f417d885c1013751c6b1a57e01c284a44be447892b99fcf700d096f2bacac87b2ca580a8a3417b8b730c4a79968355a0f1b747ae4a02940ec0a9c

Score
6/10

Malware Config

Signatures

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 35 IoCs
  • NTFS ADS 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Windows\System32\rundll32.exe
    "C:\Windows\System32\rundll32.exe" "C:\Windows\System32\ieframe.dll",OpenURL C:\Users\Admin\AppData\Local\Temp\onlinedocumentation.url
    1⤵
    • Checks whether UAC is enabled
    PID:864
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:968
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:968 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • NTFS ADS
      • Suspicious use of SetWindowsHookEx
      PID:324

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    5c46ed3e5b0d6ffaaaadcdbfd51d4af6

    SHA1

    3991823a937f6c0fe144a1f9dfe0e38fb02d89c7

    SHA256

    c1004c2c5db4d2d1c3010c484c78ec61ec3444a902b00ff9404945fd03761c34

    SHA512

    6d03a8a04c3b8e2a82525918150fc82faadb338f43d10896941241ce01fea8fa1a0664db896fbf5ace9eccb09bb91172f7d709db5b6868006634fa578f5b2497

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\b1rou5u\imagestore.dat
    Filesize

    11KB

    MD5

    f0b51af0e1eb18f5a976f85008a64e30

    SHA1

    4184740f898324087aaaaff84b29f6cf9657a2e9

    SHA256

    b4d2250d929e6c5265793bdf1e65c514b65a6711a925b7112b02cc21f72965ba

    SHA512

    9ad025d27651b97d5fd5856634a41b308f9fa0abf18407677ba4fee9dbd7e9524f772aa6525f66780ac820a2081c32ef2ac3e3769d991c1ee6b4456cdf668782

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\0R4KDLBL.txt
    Filesize

    607B

    MD5

    e97a22bd4250ad7c979d885aa11cdf27

    SHA1

    5b82a41fbf1511e4db309280cc6c2fbae788a429

    SHA256

    7bec60bc24859b59d39856f99dca6f62b2d291dfde5e2420549d7966dc6d26e2

    SHA512

    7b279fbc3e198ddc1e6a938a39cb20eb9e93553920738d0695544099d2eef6912443f0708c7589b85567569b11f73fdec3e6a101a1a03a3f7f218a32a4c4808a

  • memory/864-54-0x000007FEFBEF1000-0x000007FEFBEF3000-memory.dmp
    Filesize

    8KB

  • memory/864-55-0x0000000000140000-0x0000000000150000-memory.dmp
    Filesize

    64KB