Analysis

  • max time kernel
    66s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-20220718-en
  • resource tags

    arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system
  • submitted
    04-08-2022 08:08

General

  • Target

    http://links.bissspuxi.com/?ref=Iq8AABC-6kQITPs5p0rMbD8wPOK9CC0qAQAAAOYSiIKEAK8LC3zutVwvpC06tqVT5tUsdW8IaIyyi634VmJcg9J5BLibB-mbD3hdmUpNIsb4xxqq4NK5g3RNCkUKEtcFhHlxk7FNQcBwn07EyOI69A1jGCu6wfWd8Tbqd3UoqTEmTndy9puH5o3VqjEjaPkyfwnozl9HISy_xIRG9chx_P4xA22yu3vtM6qBhXY3y8Ayg9e2WLkDMPVOrPHlBgVJYtF-VEv0yek_n1662C4pt2xTMFFoosxuUR43X59lqIHnHAixdNUTw-uOUZLdUhidCrR5hiXnQ9SFAdp1MPmd3CwDDq1zEaVf11h2lg

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http://links.bissspuxi.com/?ref=Iq8AABC-6kQITPs5p0rMbD8wPOK9CC0qAQAAAOYSiIKEAK8LC3zutVwvpC06tqVT5tUsdW8IaIyyi634VmJcg9J5BLibB-mbD3hdmUpNIsb4xxqq4NK5g3RNCkUKEtcFhHlxk7FNQcBwn07EyOI69A1jGCu6wfWd8Tbqd3UoqTEmTndy9puH5o3VqjEjaPkyfwnozl9HISy_xIRG9chx_P4xA22yu3vtM6qBhXY3y8Ayg9e2WLkDMPVOrPHlBgVJYtF-VEv0yek_n1662C4pt2xTMFFoosxuUR43X59lqIHnHAixdNUTw-uOUZLdUhidCrR5hiXnQ9SFAdp1MPmd3CwDDq1zEaVf11h2lg
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:640
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:640 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:956

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    340B

    MD5

    8d361060908c94a1195200f132f62773

    SHA1

    a4bdd2cad063d09dd9423c1b57af8aff528dacab

    SHA256

    7d16e3284dbfe19f7b13ec7038e3f8fc616816664e5ab7e604387dc54b2f25c5

    SHA512

    8028f9cd2ed920ea9fb3fec2a7f62e6652f2527db8a721bcc4a26aa8d25aed60f28412e1fb75394c19b25ff8484ea43a5bc0c81898054359cc1887fb39505027

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\UMWKH26A.txt
    Filesize

    607B

    MD5

    68f8cb8a13475f02fd9cb00d3d48e8e0

    SHA1

    36c63fd308a2341fb2511c668d4735d56a64b308

    SHA256

    c61d024cfb80eb5616e0502e46f37857a5824790cf2d0817b7eab29ec14f2fae

    SHA512

    fbb147e61d670def823d064cf906da488003498c206d5e4b5a8547f0280ac6dccd9ce300205ee366aea2f1a61572c94886352d494a870275b4e6f3d1afc4af80