Analysis

  • max time kernel
    67s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    05-07-2022 09:22

General

  • Target

    https://jigyasacricketacademy.com/ug/MailUpdateFresh/

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 55 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://jigyasacricketacademy.com/ug/MailUpdateFresh/
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2028
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2028 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1584

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
    Filesize

    60KB

    MD5

    589c442fc7a0c70dca927115a700d41e

    SHA1

    66a07dace3afbfd1aa07a47e6875beab62c4bb31

    SHA256

    2e5cb72e9eb43baafb6c6bfcc573aac92f49a8064c483f9d378a9e8e781a526a

    SHA512

    1b5fa79e52be495c42cf49618441fb7012e28c02e7a08a91da9213db3ab810f0e83485bc1dd5f625a47d0ba7cfcdd5ea50acc9a8dcebb39f048c40f01e94155b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    340B

    MD5

    5de9465649ba673f9e1c34ad32fde464

    SHA1

    53b45936fcdc1c4d9fe5dacc1c9714d911b3a988

    SHA256

    848b21e7d4c57fe4f53890e36be7c43a625ae9a9f585c8a033720a09db558748

    SHA512

    e54a301ef47cd94c460e5146ee295dfebf185ddfaf1475ecc0d4746a38c6cb5e36e4a2fe67f74a0cef8a7da43dd832fc34cbb6596878cf0cd01bde0b25093117

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\YYW98ES4.txt
    Filesize

    603B

    MD5

    9af6313b80cc23ebc9cd899398eb477d

    SHA1

    5f977e95e37e9dad12bbd9fe581104fab4d7143c

    SHA256

    fcd3495fb53160fef1591dcc5e28c29c2a95cffd4f34e4d55eace744bbdb591e

    SHA512

    b0bbd58e6a62e6690484d0eb2d7eea600b38fb4d1d6e87bb187eb5933d46330ecee3c2bc4d1682dd4febcdf3e7c934653a64499a074aaa7aef956244fab65ce4