Analysis

  • max time kernel
    100s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    16-06-2022 08:02

General

  • Target

    nizanmfts_fr/????.url

  • Size

    121B

  • MD5

    40c8f56ca7896f633de17a04ebc1fb0b

  • SHA1

    5b06588186b9ea6a66f02d8a90936a4a07e49157

  • SHA256

    d357c51a3179360536f30b389e45b3892ff3a2d23ff42db7dd2145004ce51bde

  • SHA512

    83c821dda348104708a8fee97e4822b7af3ee546faf01745f992b3b7b981543a4042ac8bd3429b53ef733b7a00cc7923fc9c9f53f26c57d16f5fe2608216dcb9

Score
6/10

Malware Config

Signatures

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 33 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Windows\System32\rundll32.exe
    "C:\Windows\System32\rundll32.exe" "C:\Windows\System32\ieframe.dll",OpenURL C:\Users\Admin\AppData\Local\Temp\nizanmfts_fr\____.url
    1⤵
    • Checks whether UAC is enabled
    PID:1672
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1652
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1652 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:988

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\8WSB0V94.txt

    Filesize

    606B

    MD5

    8189a12f7963f0e7b6f7733245271c84

    SHA1

    e1e3a6cdbda6431d27cdfae916c86048f4f46da6

    SHA256

    4adb9509f58534c9e03276c23303646163ba436384f387f51bffd75c76733675

    SHA512

    4d2329a621b10e0eb80c737d422095e49da9eebff662d7e928718ceaedf4f70cc35f12dd235d1fe75b04f7c5f370661b7fde86812ec10fd7cff69f937a599393

  • memory/1672-54-0x000007FEFBB21000-0x000007FEFBB23000-memory.dmp

    Filesize

    8KB

  • memory/1672-55-0x00000000002D0000-0x00000000002E0000-memory.dmp

    Filesize

    64KB