Analysis

  • max time kernel
    151s
  • max time network
    161s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    20-06-2022 08:05

General

  • Target

    ??????.url

  • Size

    219B

  • MD5

    122e953f3a92541c27cc62db2d9bb0f7

  • SHA1

    5c85d98b4bce0daac9631297ddb00b005161d131

  • SHA256

    5bf9390d32df4da5ddb91425fc5002768a85305964a8e0cb8eda391b4b6511dd

  • SHA512

    77240964186d2e9c9c73ed6bf13edccaeb40c0d8cbf477080c9a40a76d044964330e97421e4b45818bfbb2688e6bfaf6720a52f2efdd3b944f3624b1b5767583

Score
6/10

Malware Config

Signatures

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 40 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Windows\System32\rundll32.exe
    "C:\Windows\System32\rundll32.exe" "C:\Windows\System32\ieframe.dll",OpenURL C:\Users\Admin\AppData\Local\Temp\______.url
    1⤵
    • Checks whether UAC is enabled
    PID:364
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:936
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:936 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • NTFS ADS
      • Suspicious use of SetWindowsHookEx
      PID:1188

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\9os4y76\imagestore.dat

    Filesize

    5KB

    MD5

    df4cb100651792c2c5a6e1c141b85d92

    SHA1

    6f1b8b7ae48a284fb48ab5d117016daf9bccb8a8

    SHA256

    80612c092657ecc46fa00cd80b8ca1705797bd879db3763a3936e6a19268bb02

    SHA512

    02f8dd429eefb5588f672d019e9a1f9f27f466b167c497068c42e57c5f84326ee692d13329f208b9d7a78b78e0f81166ea624026dd685bea97c8bfd38a48b502

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\UURKLJD1.txt

    Filesize

    604B

    MD5

    b98c199a5ccb4ec6fdadfa116362abdf

    SHA1

    98a0e0fe8b32a01a88c0fde08bb9188c518c556b

    SHA256

    f2bb1ec39a9f8c9b6d24e1510802ab557048634736bf696757ec174660a9b103

    SHA512

    4b31c4e7d3fc0e6398020186d1fb131825c1d7d2151f7323ce0a7435d067655c9f9244c90e5a8dfcb6f4e8ddb4bf9957d62c8fead9cc23182831fa80e016ebaf

  • memory/364-54-0x000007FEFB9C1000-0x000007FEFB9C3000-memory.dmp

    Filesize

    8KB

  • memory/364-55-0x0000000001BD0000-0x0000000001BE0000-memory.dmp

    Filesize

    64KB