Analysis

  • max time kernel
    69s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    21-05-2022 09:23

General

  • Target

    https://wondergirl22.page.link/29hQ?bjgzl

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://wondergirl22.page.link/29hQ?bjgzl
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:384
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:384 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1972

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
    Filesize

    60KB

    MD5

    b9f21d8db36e88831e5352bb82c438b3

    SHA1

    4a3c330954f9f65a2f5fd7e55800e46ce228a3e2

    SHA256

    998e0209690a48ed33b79af30fc13851e3e3416bed97e3679b6030c10cab361e

    SHA512

    d4a2ac7c14227fbaf8b532398fb69053f0a0d913273f6917027c8cadbba80113fdbec20c2a7eb31b7bb57c99f9fdeccf8576be5f39346d8b564fc72fb1699476

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357
    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    816f3da31b4f9bddc2ce201c4fedd80a

    SHA1

    cc83c7b1572986b5b937d6a1ba0100fd8cb10ff0

    SHA256

    8decdbd5a7655a07ad9096debf6b7f3098aaa00f3613c12b1343f62447a4ff46

    SHA512

    a48e75b110b8416b3ae2080ae18757c4730a302e6175dae298c8023c0d8317c3f3a2f42e7cbbbd65925ce81346e100c5e98068cad2f7c7882141008773fc6b9e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
    Filesize

    242B

    MD5

    59dabb8d6cba66d4558c40bf8eb1ea9a

    SHA1

    ffd3291affb6f67ddbf520906015074c536ccabc

    SHA256

    fa467492d856c0aeba5261c177457f0b16edae3c7de9967554072253eada5245

    SHA512

    2fec3375b821d71b1e101126d7f1e8b5ffdd883e8c63344408a77132ab278baa281431246cc2975d9741725b2dcdb7ccd60b33d58ba06a5e5978dd01b32dc5c0

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\Z2DJX0WT.txt
    Filesize

    604B

    MD5

    9ba9dfee29668415545c8f4bf6c62e64

    SHA1

    3608f5ba10cdb319c1f7d6d6f1776283c106d2d1

    SHA256

    3766e79f4ff95769cb0c0b46a071bd3874c152b650701806daea764997389eda

    SHA512

    2af6b91f9cc146bd0901274cdc12f53b35a5818ffc30b2f94b269e8ea391f0b9f1e1e4a0387c1db7b30373c572a0430fecb43634d3c0d0e6f905859ae8a59406