Analysis

  • max time kernel
    80s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-20220715-en
  • resource tags

    arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system
  • submitted
    04-08-2022 08:06

General

  • Target

    http://links.bissspuxi.com/?ref=Iq8AABC-6kQITPs5p0rMbD8wPOK9CC0qAQAAAOYSiIKEAK8LC3zutVwvpC06tqVT5tUsdW8IaIyyi634VmJcg9J5BLibB-mbD3hdmUpNIsb4xxqq4NK5g3RNCkUKEtcFhHlxk7FNQcBwn07EyOI69A1jGCu6wfWd8Tbqd3UoqTEmTndy9puH5o3VqjEjaPkyfwnozl9HISy_xIRG9chx_P4xA22yu3vtM6qBhXY3y8Ayg9e2WLkDMPVOrPHlBgVJYtF-VEv0yek_n1662C4pt2xTMFFoosxuUR43X59lqIHnHAixdNUTw-uOUZLdUhidCrR5hiXnQ9SFAdp1MPmd3CwDDq1zEaVf11h2lg

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http://links.bissspuxi.com/?ref=Iq8AABC-6kQITPs5p0rMbD8wPOK9CC0qAQAAAOYSiIKEAK8LC3zutVwvpC06tqVT5tUsdW8IaIyyi634VmJcg9J5BLibB-mbD3hdmUpNIsb4xxqq4NK5g3RNCkUKEtcFhHlxk7FNQcBwn07EyOI69A1jGCu6wfWd8Tbqd3UoqTEmTndy9puH5o3VqjEjaPkyfwnozl9HISy_xIRG9chx_P4xA22yu3vtM6qBhXY3y8Ayg9e2WLkDMPVOrPHlBgVJYtF-VEv0yek_n1662C4pt2xTMFFoosxuUR43X59lqIHnHAixdNUTw-uOUZLdUhidCrR5hiXnQ9SFAdp1MPmd3CwDDq1zEaVf11h2lg
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:908
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:908 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:880

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    340B

    MD5

    f8db858c46b3580a794f1cedb69e57a4

    SHA1

    021017351e4f847520d9f17e624ec9a5c371e0b1

    SHA256

    45cd429600ff038b300d27cbf7abebaf42bbffd2e1018eaf87ede5806b408b59

    SHA512

    708b4163202a297e4b5d351a4c56db9e63ed959a026c67c79074a0ce73cb3f3d1f55ebb794200805a80d658f3d6ad4ba1cfa06936a6fd811b04657d28ef9ff28

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\A0JOLNO2.txt
    Filesize

    606B

    MD5

    1f8fd8632a106b97af65b48853727739

    SHA1

    7774be4da0765c68856b9745ac6da917380b97af

    SHA256

    7f200c6c8a9e6e0b23bac6666404ceced9ae5d6cd7c54c5bcd302f24bb8501db

    SHA512

    ea6eadf0d67d1d98e5d7b205a6540f0eeaafe39247a689d515154f0237746e35c1ce0c2a2412c395e6600949c946ccf1e712e24561e403a97f81c20ea00158bb