Resubmissions

02-04-2023 14:08

230402-rfynhagf86 1

05-07-2022 11:30

220705-nmg3jsgfgl 1

Analysis

  • max time kernel
    615s
  • max time network
    1587s
  • platform
    windows10_x64
  • resource
    win10-20220414-en
  • submitted
    05-07-2022 11:30

General

  • Target

    http://0.0.0.0

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http://0.0.0.0
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2636
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2636 CREDAT:82945 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2696

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    Filesize

    471B

    MD5

    831399867695e8e2e44f24eb7b73313c

    SHA1

    403e123384b3ba656e3e1cd3815dad4a1664b224

    SHA256

    833cb46e5f4be363e955f5f3fcd655f1e610d5e33b0ae6c83a714ebfc9723f8c

    SHA512

    17e637f6508aaa1589cde6e4d9e230b6dc02256c2bf1d0dddeea7958496b57582944e1d9fd17b323573f3214f73c99dbf4455cb7ba00075605a498749725ff16

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    Filesize

    434B

    MD5

    4432d9268520c2ee7354fc4e91c89642

    SHA1

    3b57b22961d56d8c1007e52be4aaa8b5acf5f211

    SHA256

    72da5feba43823ae4f932a42141391bba45d84765441320d8f8936534fd5c28b

    SHA512

    04fc350afe570e540ad45c24d1761b85f47e91800a04224f6801d8026db7c8d00e0efe86c8940a202a9fd9f4bb39a2b32e35dd57503a3adcb503f114ae14f554

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\0CZAFMAL.cookie
    Filesize

    244B

    MD5

    15fdbcd83d5381434d2e975bb5873845

    SHA1

    ce31317fc1534ad9b73a491defca8c52eb37b7d5

    SHA256

    0ec65c20105d5a328e47c957963e2726707fa2d62f15907d6aef3e4d6a5cf230

    SHA512

    5dcf17fabc1b253f7c8f0514fe2d10cc078438efc54028f802d3cade6f8bd8fb6cd21710f18d84c37eb80339517be7f7d73e60cca5e46930cae152b43bf2a361

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\J5JZXTXY.cookie
    Filesize

    615B

    MD5

    f07238ec16605d81b896ffe255a61d3e

    SHA1

    0f3b17edaa0378a1ef206eeabbb452f9f3a6813e

    SHA256

    917d1e512dde9aef97dda721862cb3b8185a017c42773e5119994379f4025343

    SHA512

    ee60b0abac07ed24753df6cf3c1eb8b2d5a47acf73642c0b7d6a17d171575fbde6229ff010bfad39abe962bf697cadb64613f37cce79cfbc8014c31d5776fd98

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\OG7EL12P.cookie
    Filesize

    615B

    MD5

    bffa6e019c77172dc50bfac3d9700552

    SHA1

    bf718c4bf386ec450170ac18321d25b0fa996357

    SHA256

    6cc7da9c9fed904da4589d71dddf08ac20eda5493d1fbdab2caa7ca88c9c294f

    SHA512

    fbeaab5e6cde54a178593f5075651bd1525283f254d6bd3c7968cbedeee3cd9a43a359c975014a29a6c7f40324cc36ac40ff0363842a535e424b8c66f1411187