Analysis

  • max time kernel
    68s
  • max time network
    76s
  • platform
    windows7_x64
  • resource
    win7-20220715-en
  • resource tags

    arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system
  • submitted
    19-07-2022 16:22

General

  • Target

    https://redirect.viglink.com/?BLZENNMKAXPYLWSPNJNT&out=WJOKNZ1688254193drzoopTSOVNMGZB%2E%76%64%31%6C%2E%70%69%63%73%2FHTK%2FVDJJBC%23%2EYzJGc2RtRmtiM0l1Wm1WeWNtVnlRR0p5YjNVdVkyOXRMblY1Omd0Z215dmhya3c=&key=537988228e2fcbcf4abed7388e7a38ff&KFCWZUWCXGFRGTJKLALK

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://redirect.viglink.com/?BLZENNMKAXPYLWSPNJNT&out=WJOKNZ1688254193drzoopTSOVNMGZB%2E%76%64%31%6C%2E%70%69%63%73%2FHTK%2FVDJJBC%23%2EYzJGc2RtRmtiM0l1Wm1WeWNtVnlRR0p5YjNVdVkyOXRMblY1Omd0Z215dmhya3c=&key=537988228e2fcbcf4abed7388e7a38ff&KFCWZUWCXGFRGTJKLALK
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2000
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2000 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1072

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    340B

    MD5

    bdcb93d57ca230fbc2291fbed44e3fe0

    SHA1

    9f8677a7f67e35708ff61269861d9f073befb872

    SHA256

    5f5497b01d27414d8aca69c2dd12233711f4a6bf3f69733df2d1819f5ccfa289

    SHA512

    f4bc2e5a2f503cb48d00b216093bc53fc5a983758904dfb1ac33a9cfef5b4bb4ced05c4a27ff3442f42823db59d681a2fa7fddc426dbd3c24f80ebb817d6df69

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\AZWVVUOA.txt
    Filesize

    605B

    MD5

    477e290e41c167f91bcd2b933733bb37

    SHA1

    58e88be3b5d77c3f27c8490a379381ed269d0602

    SHA256

    a74a4370c243da9ca4d90e744edc570684f3319e708ba37c8a6356190104b850

    SHA512

    b932248c77775fed0e7bc065546df0f7deadda37123debbc30d99894d7dfc824786140850653067c7f68d111b4390daf85cb0193a539e86b6eb0a06879a3b7d8