Analysis

  • max time kernel
    136s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    21-05-2022 19:16

General

  • Target

    ??????.url

  • Size

    201B

  • MD5

    47a561901ffa934b885b8de0ce516631

  • SHA1

    adfe50a7a7668789a3190b2b7d0695854e8e75cd

  • SHA256

    cf6821351c7c30b25243bcfc480784595845a7c7d4c6eec0b0219d0b4bb6d334

  • SHA512

    b8db94d365f36079ba58d26ebf59f45ff14a5b71fc9fc6d7eea6bb92ccb1506d678684abbfeea95b91e378b20346ed2ff5c820866b50f17712da7daa69874f66

Score
6/10

Malware Config

Signatures

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 48 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Windows\System32\rundll32.exe
    "C:\Windows\System32\rundll32.exe" "C:\Windows\System32\ieframe.dll",OpenURL C:\Users\Admin\AppData\Local\Temp\______.url
    1⤵
    • Checks whether UAC is enabled
    PID:1836
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1464
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1464 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • NTFS ADS
      • Suspicious use of SetWindowsHookEx
      PID:932

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
    Filesize

    60KB

    MD5

    b9f21d8db36e88831e5352bb82c438b3

    SHA1

    4a3c330954f9f65a2f5fd7e55800e46ce228a3e2

    SHA256

    998e0209690a48ed33b79af30fc13851e3e3416bed97e3679b6030c10cab361e

    SHA512

    d4a2ac7c14227fbaf8b532398fb69053f0a0d913273f6917027c8cadbba80113fdbec20c2a7eb31b7bb57c99f9fdeccf8576be5f39346d8b564fc72fb1699476

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    35909ffb8c80c6df4fa33779984b843e

    SHA1

    dc5783f2426370abc5dce61eb250cc1965fa4a52

    SHA256

    0e31e5eb203e90f10859f0970f456c63681e91e8529d6f51da641d6e1303378c

    SHA512

    177614a71c4d4df70aeea9aedd65cf8c7d51f444fc89e8056db995f1fdb7fa5f6bd6a276d512b117d287551ac756b1ffdcea47b8f6eb71b45a99794b2c93a2db

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\k007hrg\imagestore.dat
    Filesize

    5KB

    MD5

    9f48d13aa8750f4854df7461eeb873ab

    SHA1

    b4e33651f7687c32dafa7faffcbe7ee66279a216

    SHA256

    dffa672668d4325d3bff7d965f97256115492f19fe5f85f6d72c6fc039e15b55

    SHA512

    6741c1379fa494c20a79dbc5d02012f83551866f621140c1d8d34ccbadcef26c72244726e513884cfa62492bcde52b491fb7996fd6b965bb2228a42c4fbb6541

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\MTUCQK9F.txt
    Filesize

    587B

    MD5

    ed6d90528fa27bfd03c250e9f84870bc

    SHA1

    2f04353b34ba6a24c80f806cb26d9acc9b251ff3

    SHA256

    b58bd725326d99e461b7396de5575154692ea35f43ba7d9bcb6221538cae4fe4

    SHA512

    0624414c71b816da0ff09f1480cde8be229eab30e2efac0ea531948006e04a614cfdc9b104b6960e0acc07b783e9aa25f21f4a52aced6d498e319b621e4fdbef

  • memory/1836-54-0x000007FEFB7B1000-0x000007FEFB7B3000-memory.dmp
    Filesize

    8KB

  • memory/1836-55-0x0000000000140000-0x0000000000150000-memory.dmp
    Filesize

    64KB