Analysis

  • max time kernel
    67s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    07-06-2022 10:36

General

  • Target

    http://www.norwii.com

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 47 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http://www.norwii.com
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:596
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:596 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:2012

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    feb5b06d302bfa4343aee92ffb8ecaf6

    SHA1

    2d1f257c3ba5d5c340bea17f55b797d4415b94f0

    SHA256

    b2e9d6275a1ff842ced7fd45aad8c75a2cad400548b9f432c4019ba01a77fe0f

    SHA512

    497a2b5aec1048dfa4350170cd0994488860f24a27813bded9d2ca1d2d12bd82aa3be8385f7beb64b17fe7767c71070a1d3257697ab1f69b89aa9abe52410ea9

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\9os4y76\imagestore.dat
    Filesize

    8KB

    MD5

    6b28def84de911ae072f57a11f3896a9

    SHA1

    cea5311df9e02e647058e5685449ebd1ff99e6c3

    SHA256

    39abf776c80f6bebbfd4b0357aa409305f9799b8a6b7c660e96796e20e19596f

    SHA512

    2b1cecca454d471e37fc334fd7abc182e783667e5dbce95c759cf45f479bbf080a08654734dfcfeedb4ad5984e8cf49834ca449434bf3a5aa3dfcc846d2fafdd

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\J7UU5C48.txt
    Filesize

    604B

    MD5

    802103d9f3ec4709a1c7d17e016290c5

    SHA1

    3136763434a84cc115405f71ecf40c0c0d9466a5

    SHA256

    3bf9282e2fdcdac9b16d6a5b5e05461c99dfd5c74b65152d465931e5b6c722e0

    SHA512

    eabc55e4db757769666b3e854c3bbffacaf976e25e9ba17fde07cac9e0a93de0b1a9a476756c6daa78b84e611dd8951eac5b37d235073f291ebe49a08aa9c969