Analysis

  • max time kernel
    98s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    24-05-2022 17:42

General

  • Target

    Robot.url

  • Size

    116B

  • MD5

    4127f6d4456cb4a5741f1f7fdc190f4d

  • SHA1

    beca1b38b45110b651e833c7bd764840bf3c8e97

  • SHA256

    6bd187e01ceda60cad3bce523deb489d7c45c8007c58715c10eeb2adab5c4c23

  • SHA512

    43dac583ad53331ded9b9ab526b105ced84ff2ad678f72d6da04ae032ae45b8369dab4ae5464aa76212e2fcc7a1088d584b9fea8c774eba2902038f31d446112

Score
6/10

Malware Config

Signatures

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 33 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Windows\System32\rundll32.exe
    "C:\Windows\System32\rundll32.exe" "C:\Windows\System32\ieframe.dll",OpenURL C:\Users\Admin\AppData\Local\Temp\Robot.url
    1⤵
    • Checks whether UAC is enabled
    PID:1932
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1080
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1080 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:992

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\9ZAXFE61.txt
    Filesize

    605B

    MD5

    8d5c422835cead15de80fffee10635c1

    SHA1

    edd6a594313b36feaa97714684e7b2a714fc6cee

    SHA256

    20f25f71b717c77af183b5afd997a9802dad70fefe67261e8113d57f8e6ae5d8

    SHA512

    6c011ffafad049d0920405986dbcbca385500ce7fdb7774f265f452f3b042eede27c3141fd1b31bbf4bcb337a51f8d58983972872b092b33ac94554e72bf784c

  • memory/1932-54-0x000007FEFB751000-0x000007FEFB753000-memory.dmp
    Filesize

    8KB

  • memory/1932-55-0x0000000001BD0000-0x0000000001BE0000-memory.dmp
    Filesize

    64KB