Analysis

  • max time kernel
    247s
  • max time network
    227s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220721-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-08-2022 06:24

General

  • Target

    https://s3.amazonaws.com/zedertgfdgtrg/zedertgfdgtrg.html#qs=r-adjkfadigbkefhhaffiffjeakfiggefafeijdabafeijdabagiadhaccacccfadeihacecdgiacb

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 35 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://s3.amazonaws.com/zedertgfdgtrg/zedertgfdgtrg.html#qs=r-adjkfadigbkefhhaffiffjeakfiggefafeijdabafeijdabagiadhaccacccfadeihacecdgiacb
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3784
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3784 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:5044

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    Filesize

    471B

    MD5

    29cfcce308fc86433aab93d24e4f06a1

    SHA1

    f48ec3b1dcfe201e9ebe797fa2c97fd006803723

    SHA256

    253a8be7fd3b8dd52b67f9bb3448ec4df3259666acfc1cd73f2b1d2f913d4d78

    SHA512

    0f5caac8fa23be8c07055e81996cb00626c01c2c00f1e292292941dfd90604ab5b5e82798d92086320c623b4fed7115d0b55cb7645b243d9ed542115b7eec8be

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    Filesize

    404B

    MD5

    f875b1d4e1ad95af37f7732234d58ed7

    SHA1

    013c2a9b27787995ecaa0d0effb49c06a2241c21

    SHA256

    7ef4ce8ca968df45b433cb0b36f62c73269201092175082e200570e2c1782eaa

    SHA512

    ac6ba3e8a7c6f6cd2e46cc68e02d092f7cb15db6e1bc2b6d8c54afb4d389b85ab7041edbb959c12e8baa5811d2c04f46784dc3bfb3c8d89695a8308c92bbc3d0