Analysis

  • max time kernel
    149s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    22-05-2022 14:26

General

  • Target

    https://subscriber.jiangcibb.top/SubscribeClick?gk=rb&kf2=test@test.com&6a5=&gor=Gregory%20of%20helpful%20cats%20It's%20not%20that%20I%20don't%20l

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 15 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://subscriber.jiangcibb.top/SubscribeClick?gk=rb&kf2=test@test.com&6a5=&gor=Gregory%20of%20helpful%20cats%20It's%20not%20that%20I%20don't%20l
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1284
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1284 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:2092

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    Filesize

    471B

    MD5

    6feb4750c81f3cccd89d617256efff07

    SHA1

    65aa1afa690bb208466f5326b3f39be900ca3751

    SHA256

    d7d6f9f42427e271f85faeac6705b729d6d30bf406de86ef908327703fb71a09

    SHA512

    f8b0b74732e601a3a670366c91c688ebe92e30af219f375a10cdf0dbf7344ccf5c489453129d4b15321d2017a651ef34ce026145692a54c239b418252fd23212

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    Filesize

    404B

    MD5

    c81ace609027d937634bf8fa8fad7bd0

    SHA1

    b12c941aebe40af48a48d2680b293bda2fc4f25d

    SHA256

    c33aa48ddd83ddb49e32d39371a1d1b65c8eff5a02f91efa56a8cfe3ea05a565

    SHA512

    e886dc7edd02931da7448ae6dac198764a814ff7e59b97f9ade26766933ca384eb5e58bf238015dde8c47360502b2f1838cd7731809995948088d5ef54b83896

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\a5473fd\imagestore.dat
    Filesize

    5KB

    MD5

    ac55da59a191a2eb89d42a6ec9da1587

    SHA1

    724bbad5f8e227d2bfe67d05c75c8ef2f508eaab

    SHA256

    d2a374827a7c079393fdfb69b980028dc3ec32658617c2daa963fdbc4d47d274

    SHA512

    23ffdeb00c68e0cce9d1daee905a5a8ebb80b8230cb36ab0816886e3d580f833ea74809751dc5735921f684b607b0ae0386a2cff005376725b6734086cd0f3f5

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\a5473fd\imagestore.dat
    Filesize

    7KB

    MD5

    506b3638ac2ba5d8a3e86d2b4c0fc390

    SHA1

    a9b4c785462fce3c1645f95a5033871166140607

    SHA256

    948fdc6dd781d1d72e3e76d1908f5baa831c48283a939e4e12b4d9abf9bfc711

    SHA512

    f32964cc2139438ad0ce335820b1fb3194ba30b5d6679a7755da05bed28336ef97cfe4a0e08d1e37c9c008b5c6d3fa4f4f0c2f3ec12395eb1bd05c98aa730ced