Analysis

  • max time kernel
    115s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    23-05-2022 15:57

General

  • Target

    http://7476.aftral.tranzit-auto.com/#toto@societe.com

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 5 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http://7476.aftral.tranzit-auto.com/#toto@societe.com
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1080
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1080 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:628
  • C:\Program Files\Mozilla Firefox\firefox.exe
    "C:\Program Files\Mozilla Firefox\firefox.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1956
    • C:\Program Files\Mozilla Firefox\firefox.exe
      "C:\Program Files\Mozilla Firefox\firefox.exe"
      2⤵
      • Checks processor information in registry
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:704
      • C:\Program Files\Mozilla Firefox\firefox.exe
        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="704.0.1684804003\68047030" -parentBuildID 20200403170909 -prefsHandle 1180 -prefMapHandle 1172 -prefsLen 1 -prefMapSize 220017 -appdir "C:\Program Files\Mozilla Firefox\browser" - 704 "\\.\pipe\gecko-crash-server-pipe.704" 1280 gpu
        3⤵
          PID:1844
        • C:\Program Files\Mozilla Firefox\firefox.exe
          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="704.3.2095914697\699607092" -childID 1 -isForBrowser -prefsHandle 936 -prefMapHandle 932 -prefsLen 156 -prefMapSize 220017 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 704 "\\.\pipe\gecko-crash-server-pipe.704" 1776 tab
          3⤵
            PID:908
          • C:\Program Files\Mozilla Firefox\firefox.exe
            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="704.13.2089251878\1099788843" -childID 2 -isForBrowser -prefsHandle 2700 -prefMapHandle 2696 -prefsLen 6938 -prefMapSize 220017 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 704 "\\.\pipe\gecko-crash-server-pipe.704" 2712 tab
            3⤵
              PID:2176

        Network

        MITRE ATT&CK Matrix ATT&CK v6

        Defense Evasion

        Modify Registry

        1
        T1112

        Discovery

        Query Registry

        1
        T1012

        System Information Discovery

        1
        T1082

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\U23JW2BV.txt
          Filesize

          605B

          MD5

          85fd35d7fd0cda0dea2d5bdb44782558

          SHA1

          650971f3e32a2ac91c94ad19236bda79132cb241

          SHA256

          5aa103a32d192ebc804aa7d39bfc51429df18a765e6bbc70b1290c19257b018b

          SHA512

          f29d1721353ed60b00d333dde539de0fef974daaa7728ca9de1c223de3c2d3b1ca3884668d62fdf09c818f8915cb398f33258df7bf2b0a5b963323bc24003885