Analysis

  • max time kernel
    123s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    23-05-2022 15:38

General

  • Target

    https://protect-us.mimecast.com/s/4hyqC31pzvCMP3RigOguE?domain=carrie7878.github.io

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://protect-us.mimecast.com/s/4hyqC31pzvCMP3RigOguE?domain=carrie7878.github.io
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1056
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1056 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2028

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    d21d124ca50d5f84386bb7d3b34f3c20

    SHA1

    5a128d92e34e1983a282a7d78df43fa2b5c46683

    SHA256

    f2b00ac0220a899738b1a3c3407a7a0397d8dcce6698ce356b885afc67b9ed59

    SHA512

    0034d62c6b566ce0868b6450fac0ccc07d7d3d39e162ef276efaba8816ed8192f89ad39213f415b80bd03060e897a1131064284c1bbcdf7f32288d14c4436b35

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\k007hrg\imagestore.dat
    Filesize

    5KB

    MD5

    82e5e9c48ab9979e7d0e5a1896b831b4

    SHA1

    99b93575a51a7de7c670bb083f8814c5cb5c2b5f

    SHA256

    c918820f6f8f7565674401974067c1353693891cbb502815a38e145013a8d12f

    SHA512

    b0e4e690f192ef53e6165b162c0d46aa643435c0403d3bc59dd5d18f8653d41b97ac2df61a0efb9bd29ce67e9c032bb1608ee560889f778a427d4c0d74e14c40

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\DT6LGE2X.txt
    Filesize

    599B

    MD5

    87193ca58b22a5b6f6139f6928929795

    SHA1

    9ca8f02f03117413b18745d6f0bcb0fcc987a562

    SHA256

    2363093c1ad5eb3b396a9ad4c96b99026eaf8e276ae7ac6cf8d27644ec710311

    SHA512

    48a69fc76fd520660878f931fef0fe3c24ce42505837ab221f1e036ba27105355d8ae691ff6046029444b78446ab27895ea4a370399a0dfb186de29673500a99