Analysis

  • max time kernel
    125s
  • max time network
    156s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    12-06-2022 09:20

General

  • Target

    keygen.us.url

  • Size

    71B

  • MD5

    50f22b7f3082c257ce8518314c0d78ea

  • SHA1

    ce9d311110e8216cdc90d76a61649b58d151935c

  • SHA256

    416298fcb9afd5be5466439879cee4e3aeb0a013c22949871f93e5975007336f

  • SHA512

    8f1d375885a4a28b250e493540003ab4f99df9fe0808e52ad1ad43eb4a72897c091bb40d9096819b2506ac9a50188c9b2f52b93b9171fd833bc221b28fbfecec

Score
6/10

Malware Config

Signatures

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 35 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Windows\System32\rundll32.exe
    "C:\Windows\System32\rundll32.exe" "C:\Windows\System32\ieframe.dll",OpenURL C:\Users\Admin\AppData\Local\Temp\keygen.us.url
    1⤵
    • Checks whether UAC is enabled
    PID:912
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2008
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2008 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1368

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    80a2ee0635e055c00d00ab0273dca1c2

    SHA1

    e9def56747767b9dcab800dea322196a6b2e3991

    SHA256

    7ed2b5d6fc2d9506827df72320f2998315e2c47d85124ca50c045521c12cbad4

    SHA512

    4750afb99b676b0ddd83057714a11dd4fd1e373d9ef3075f9f974d00994d48d6ca156636f870614273ac8cb534542a12f3b196fcea857f8023bcb8ea23b4ff49

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\1X90JWUR.txt

    Filesize

    605B

    MD5

    daec86cbd526d1656c078e1fd5609d29

    SHA1

    3732f5ce0d0fe7026a9ceb3bce4e96fa306540f7

    SHA256

    34d3821266f7f5ac775d5b373574bf88b2784b3d2b52e66aaa0f90b75acdb72b

    SHA512

    2f7c900f28e6310f14996ffa3f23a7a211685d0a4c952acd18c6eeefd0004727796835b20e38f42f5e71eb522c172f80f3cc98a5fdfb2ac94660afe7184be68c

  • memory/912-54-0x000007FEFC281000-0x000007FEFC283000-memory.dmp

    Filesize

    8KB

  • memory/912-55-0x00000000003C0000-0x00000000003D0000-memory.dmp

    Filesize

    64KB