Analysis

  • max time kernel
    69s
  • max time network
    75s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220414-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-07-2022 16:22

General

  • Target

    https://redirect.viglink.com/?BLZENNMKAXPYLWSPNJNT&out=WJOKNZ1688254193drzoopTSOVNMGZB%2E%76%64%31%6C%2E%70%69%63%73%2FHTK%2FVDJJBC%23%2EYzJGc2RtRmtiM0l1Wm1WeWNtVnlRR0p5YjNVdVkyOXRMblY1Omd0Z215dmhya3c=&key=537988228e2fcbcf4abed7388e7a38ff&KFCWZUWCXGFRGTJKLALK

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 30 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://redirect.viglink.com/?BLZENNMKAXPYLWSPNJNT&out=WJOKNZ1688254193drzoopTSOVNMGZB%2E%76%64%31%6C%2E%70%69%63%73%2FHTK%2FVDJJBC%23%2EYzJGc2RtRmtiM0l1Wm1WeWNtVnlRR0p5YjNVdVkyOXRMblY1Omd0Z215dmhya3c=&key=537988228e2fcbcf4abed7388e7a38ff&KFCWZUWCXGFRGTJKLALK
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4756
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4756 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:4136

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    Filesize

    471B

    MD5

    d29eea74f050bc7315a858980e1180df

    SHA1

    540b2a1430112b1bf987437bfdd746d234278dda

    SHA256

    64938d4cb84b765cca9f32a8825588a48322a5d6dd5c21244b98eedd422d2e88

    SHA512

    871723ce52badc3001df5eec0305ba1d0d634917b1eec1ed8e151fcaad837cb7613b1816d437fe2b1f655fb3a3743ffc5ee79437a5772f4f2c3c00f42e472777

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    Filesize

    404B

    MD5

    3599c18017a77f2f6a3916b01efc1ec9

    SHA1

    8818e5fa362f2e2882d7f6e60c31d227ceebdccf

    SHA256

    8f9d546dc879f7ae2fcf1b87864a9154d8750bf73d4aab76cc6c1a3768d4a72f

    SHA512

    86a0b9b5417563ea741730af42aeb507074c288756c4c7ab57d8fb14b586910a80c141d47273b007d2ab7bab85f1fe6756967c33af7d60c13cabf608d5e9b5ad