Analysis

  • max time kernel
    97s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    11-07-2022 01:43

General

  • Target

    https://dilscordilgilw.com/

Score
6/10

Malware Config

Signatures

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://dilscordilgilw.com/
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1844
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1844 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:848

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Command and Control

Web Service

1
T1102

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
    Filesize

    60KB

    MD5

    589c442fc7a0c70dca927115a700d41e

    SHA1

    66a07dace3afbfd1aa07a47e6875beab62c4bb31

    SHA256

    2e5cb72e9eb43baafb6c6bfcc573aac92f49a8064c483f9d378a9e8e781a526a

    SHA512

    1b5fa79e52be495c42cf49618441fb7012e28c02e7a08a91da9213db3ab810f0e83485bc1dd5f625a47d0ba7cfcdd5ea50acc9a8dcebb39f048c40f01e94155b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    340B

    MD5

    21726eb6b60fbe6d582d74b71c5b0bcd

    SHA1

    d532b783723c3f627879d2219a7e9709cad855b4

    SHA256

    b0e68b9660b913be896fd29a082b214f56bf36df3e3d7f9fbf2e45b4e309074e

    SHA512

    6b0910e8ca0b6573eb51d3318c4e743c0e0a0513897eb01b4d47619725bdb48d189063ac224434fcf56fd3ed5333261cea20f3aab53afa0e69c841d623c3ec2b

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\k007hrg\imagestore.dat
    Filesize

    12KB

    MD5

    5b58b1fad820429972d22a5ece9f0236

    SHA1

    818fae0ecc6ad086d629cb824b4d00c379881c4f

    SHA256

    e6a22e5765db82250ddd4b2f9a140157dd168af21744f3748f2661e0b751170e

    SHA512

    04977ee737894db29cf29c84149ec751d9bc6299b763112dc023e37486fd8d415406e126eae52b29cb90e2a827e84d659c6f674010ef63fd88191d1ee2fec10a

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\0LYXPK8H.txt
    Filesize

    603B

    MD5

    bfec846faf214bc4f49621091ab21605

    SHA1

    3d1a6f30da9ab1b7aaf1206bdd8c6a98a8d1d6f2

    SHA256

    8631f54dca33e840fa620eb53d85b9fce0133bd0b6489eb91357ce38ddf10741

    SHA512

    2bc0f2eb1c22f988453724827dd4246a7411706c72738b117b3e1da14bbefd661a069c66ce82fce8c21a44ad308b54acdfdd847be6e2c981a2654327459e019c