Analysis

  • max time kernel
    187s
  • max time network
    189s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    12-06-2022 13:44

General

  • Target

    at180dll_itmop.com/IT???.url

  • Size

    332B

  • MD5

    5fd0d7045ed3f025aae5bf2c84579936

  • SHA1

    07a4f1b62b2d3570fe1bf6b3fd555aa9710cf029

  • SHA256

    759fcc17e29ef279be3a30af2051f2aa2ed1823fe953497eafdbceb3c2605339

  • SHA512

    1b26d23bea296ce074aab4b6fa83c60757d94cc304c6f83d4439f388821a7b6bef527a468bdb0ec98bdc7833eb0996892e5f74e752761e2a6a8a3a100c6dbb2c

Score
6/10

Malware Config

Signatures

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 42 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Windows\System32\rundll32.exe
    "C:\Windows\System32\rundll32.exe" "C:\Windows\System32\ieframe.dll",OpenURL C:\Users\Admin\AppData\Local\Temp\at180dll_itmop.com\IT___.url
    1⤵
    • Checks whether UAC is enabled
    PID:952
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1804
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1804 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2024

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a2167fd6f8b67d27d216ef52ae51bb77

    SHA1

    c65ae7a85acd56dc1e51cf7101211acc025e267c

    SHA256

    c7c04db13db6636225f92ca543a5b24e38a00794376bd581a5ab69f05b07a594

    SHA512

    88ab612b6e196d69ef30a99c94502aafb083607749ca6baed049e438e12b1eabccfeb21c408766697ff12e43822c6a2bcba3612b708bd85c1ad11120683e422e

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\k007hrg\imagestore.dat

    Filesize

    8KB

    MD5

    1a70db086058aac09c8b243133b96ae1

    SHA1

    5ac3d4ba574a47cfcfcb5bd4dc3d7cc68c7fa67a

    SHA256

    0e6841ef303b824c8b588b8082579612270dde32d8858cea220c62e06bf25e04

    SHA512

    fefd59e07a8ce15e06212b77f8ebb395e2a902b97925ab295897329bb185854d38d0e4eb5518770542c3443293f4368f9508935a03af6de64c02f0daaea0829d

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\8WMDSCO4.txt

    Filesize

    603B

    MD5

    10be68d9f148e37948c71beacd03b7bb

    SHA1

    1eea6b79d897afc8d08cb269b4ed5098b49469e0

    SHA256

    df230d526432dbab54095d0ae5cf531a7c898fd98ce42dff495b58cc64c0d381

    SHA512

    f2bcccc3cee3ae948a057c5168f8db7960cbdb4fc995ae76c8510d4b1fe02f78619168b0408a679acec19ad867c1e8329d56fa55bc7c3b4d1c59921bb95b6a03

  • memory/952-54-0x000007FEFBAA1000-0x000007FEFBAA3000-memory.dmp

    Filesize

    8KB

  • memory/952-55-0x0000000001BD0000-0x0000000001BE0000-memory.dmp

    Filesize

    64KB