Analysis

  • max time kernel
    149s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    22-05-2022 15:48

General

  • Target

    https://subscriber.jiangcibb.top/SubscribeClick?gk=rb&kf2=test@test.com&6a5=&gor=Gregory%20of%20helpful%20cats%20It's%20not%20that%20I%20don't%20l

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 63 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://subscriber.jiangcibb.top/SubscribeClick?gk=rb&kf2=test@test.com&6a5=&gor=Gregory%20of%20helpful%20cats%20It's%20not%20that%20I%20don't%20l
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2768
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2768 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:4948

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    Filesize

    471B

    MD5

    6feb4750c81f3cccd89d617256efff07

    SHA1

    65aa1afa690bb208466f5326b3f39be900ca3751

    SHA256

    d7d6f9f42427e271f85faeac6705b729d6d30bf406de86ef908327703fb71a09

    SHA512

    f8b0b74732e601a3a670366c91c688ebe92e30af219f375a10cdf0dbf7344ccf5c489453129d4b15321d2017a651ef34ce026145692a54c239b418252fd23212

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    Filesize

    434B

    MD5

    bd76d5d43d9140d4a6ff7978f46ce0fd

    SHA1

    e97c0eaab5c6302d1e4054c5567cbc7e79a345f8

    SHA256

    664c0be21039d50e8ca4d3308cc60fed1ccdbb4047cc82d1ce1764785d762438

    SHA512

    e18d94e4b8c88bcf5b060876796219845f555efcf2e18d8a77ceb4c585fec0a98e2565acdc474b2a4584131e3995adc0bc88ec3d654c0192ff62bface4aebac8

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\jnqp20o\imagestore.dat
    Filesize

    5KB

    MD5

    fe6f8c357cbbc5616cc66b0847e8c881

    SHA1

    4add08f51d8ef2c534499fa9fde413a8f30b27e4

    SHA256

    542dc162ea6fa532c90151f7493179eb73052ee490d160c255696308d4652455

    SHA512

    402caaa1f914c000ed5edc5efadd33593bf13ee969a47ca9f839e9c7fd5dce59d6f3b9b93b1d2071c364a1eb7a8a6e99257236265bcc725515fea54278b95c9c

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\jnqp20o\imagestore.dat
    Filesize

    7KB

    MD5

    0a37bf6f68bf615cb62a4755cca92812

    SHA1

    e3b764c147bb0e4000c270a90b902fa90fdc6d54

    SHA256

    35ca9fff77bc4f16acf3bd6a799c67abfa8a4e6ce2a706251f53b72dcbd0d0dc

    SHA512

    e1e068936574f8f63bcb1af69d217c7f0f45cbc469c32668f849e9364b8655d9d616fd10bc72f3325b3c4cb647306807283f242ddc559cf32780029f293fd176