Analysis

  • max time kernel
    137s
  • max time network
    159s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    31-08-2022 06:42

General

  • Target

    http://212.83.163.95:7777

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Executes dropped EXE 2 IoCs
  • Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http://212.83.163.95:7777
    1⤵
    • Modifies Internet Explorer Phishing Filter
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1628
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1628 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1740
    • C:\Users\Admin\Downloads\c.exe
      "C:\Users\Admin\Downloads\c.exe"
      2⤵
      • Executes dropped EXE
      PID:1032
    • C:\Users\Admin\Downloads\sysdvx.exe
      "C:\Users\Admin\Downloads\sysdvx.exe"
      2⤵
      • Executes dropped EXE
      PID:1880

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\3WDGHDC4.txt

    Filesize

    608B

    MD5

    2d7764b1bdf6d8cb250bd4a9cd6f4ec0

    SHA1

    fba7c2a08d2caf7005b051a3cc557a683591fdaf

    SHA256

    bdf7a01cab60560191fab1005a1df16c589ea754356a549c09140e8be9e9d9e4

    SHA512

    ee5f81e33da7f42ad8d5b776db664dc949f1b5a5254a91cb55b78770891703b8bfba134fb38ab8ba5f04fb55d08d6f8331b668850300f218b0eb3ea53e7593a1

  • C:\Users\Admin\Downloads\c.exe

    Filesize

    72KB

    MD5

    148e93aa23ccd06a56e308743d3e46fa

    SHA1

    565b7e2935c11ac1780d4b0a2afd0b15f62d7ffd

    SHA256

    9f45d0617825b8b60672eb57351a73ae09f1e9d0a966bc82d95a82bd4a3c2dfd

    SHA512

    7a9129c43a559734e6948b33add728ae262d1b4b22bc1cfce104560e338fdecac83b394b3c118e32247f338d6dee80fa0ef37a4176dc31667745157e309a1354

  • C:\Users\Admin\Downloads\c.exe.lycgzlt.partial

    Filesize

    72KB

    MD5

    148e93aa23ccd06a56e308743d3e46fa

    SHA1

    565b7e2935c11ac1780d4b0a2afd0b15f62d7ffd

    SHA256

    9f45d0617825b8b60672eb57351a73ae09f1e9d0a966bc82d95a82bd4a3c2dfd

    SHA512

    7a9129c43a559734e6948b33add728ae262d1b4b22bc1cfce104560e338fdecac83b394b3c118e32247f338d6dee80fa0ef37a4176dc31667745157e309a1354

  • C:\Users\Admin\Downloads\sysdvx.exe

    Filesize

    573KB

    MD5

    0554bb64f82b5627c462e93bc429ff4d

    SHA1

    653de64978dcca54d5ee89a9662390fdc14e91f7

    SHA256

    eb580a26823d80a1777d9f9f10ca3e13b74c676c0f867835ad39d137c01027f1

    SHA512

    1af7c18fb8bc52cc83fa17a3b1d2102739a78e931ea0035624aa78b5a7cb913cc41b5de76c6410e4440ded842bd7bd953966ce880dc5335ca23b1a91d1014201

  • C:\Users\Admin\Downloads\sysdvx.exe.uqzdpx6.partial

    Filesize

    573KB

    MD5

    0554bb64f82b5627c462e93bc429ff4d

    SHA1

    653de64978dcca54d5ee89a9662390fdc14e91f7

    SHA256

    eb580a26823d80a1777d9f9f10ca3e13b74c676c0f867835ad39d137c01027f1

    SHA512

    1af7c18fb8bc52cc83fa17a3b1d2102739a78e931ea0035624aa78b5a7cb913cc41b5de76c6410e4440ded842bd7bd953966ce880dc5335ca23b1a91d1014201

  • memory/1032-55-0x0000000000000000-mapping.dmp

  • memory/1032-57-0x0000000075831000-0x0000000075833000-memory.dmp

    Filesize

    8KB

  • memory/1880-59-0x0000000000000000-mapping.dmp

  • memory/1880-62-0x0000000000400000-0x0000000000497000-memory.dmp

    Filesize

    604KB