Analysis

  • max time kernel
    151s
  • max time network
    159s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    14-07-2022 06:27

General

  • Target

    https://marketing.wpninjathemes.com/cln/?i=i&0=baku@mae.ro

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://marketing.wpninjathemes.com/cln/?i=i&0=baku@mae.ro
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:316
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:316 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1728

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
    Filesize

    60KB

    MD5

    589c442fc7a0c70dca927115a700d41e

    SHA1

    66a07dace3afbfd1aa07a47e6875beab62c4bb31

    SHA256

    2e5cb72e9eb43baafb6c6bfcc573aac92f49a8064c483f9d378a9e8e781a526a

    SHA512

    1b5fa79e52be495c42cf49618441fb7012e28c02e7a08a91da9213db3ab810f0e83485bc1dd5f625a47d0ba7cfcdd5ea50acc9a8dcebb39f048c40f01e94155b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    340B

    MD5

    e44cc58fc0101cf92f792bd084c45511

    SHA1

    c7ec0e8d7002a01397e69849619f4fc9f0801a22

    SHA256

    80da9dd9e9fc06f447791bfdd19e8fccaa3b5d5086632632f9e8099ca0c6a50b

    SHA512

    c3208b9720466c9bb40d4291e3e1ad69884b916ea1582491d7297063547dcba9d7ad996882671bacc641775cbca123f97d1a010c2c4981ea0bdcd450d0cd3c03

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\W3CJELRO.txt
    Filesize

    604B

    MD5

    2f0e9a8f9206d89e1d42e43c661c026a

    SHA1

    b9ca5f30391a94eaff268f905cd50e0508422b83

    SHA256

    7df28dd2fe5c9d83edad2a80b1d221c349914fac1f251dff03f9164ea0f65361

    SHA512

    5cc0115e3547ffb4e9626924b5eef5fb178af69bb7dcbe1e6d48d5bc7aec74580781204cd2f9aa4ea17271138f7695fe6636fa83a027faa676894539d32c6561