Resubmissions

08-09-2022 17:44

220908-wblklafbe7 3

07-09-2022 00:27

220907-arqnlaafh7 1

05-09-2022 16:52

220905-vdthjsehd3 3

05-09-2022 16:42

220905-t7p7jsegc2 7

05-09-2022 16:37

220905-t49f1sefh3 3

31-08-2022 06:37

220831-hdwlpabhc7 1

31-08-2022 06:32

220831-haw32sabhk 10

31-08-2022 05:40

220831-gcy5rahffl 10

Analysis

  • max time kernel
    66s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    05-09-2022 16:37

General

  • Target

    http://20.7.14.99/server/

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http://20.7.14.99/server/
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1212
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1212 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:860

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\tcz8fqz\imagestore.dat
    Filesize

    34KB

    MD5

    1636b643b2f9f1fb926ec225535a47c0

    SHA1

    7ef866b431b303c47f62dd01bae90625891a8ec3

    SHA256

    858d188b7bafbedbb838f211904a96fe1d17dab311302c2207e5b619d48408a7

    SHA512

    9e13b355da1c641a40891f0b63421d5e57a94077841f73e01a2dc5aaa807501ab0b6139a862b1f5cbce3485a6bf9e15b4f7e097018fcc511f9aeaf3cdc64e1a2

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\A0LWXI7M.txt
    Filesize

    608B

    MD5

    13e823bc14c14d66185801a121d9afcf

    SHA1

    0c28002cf12802447be9f342f4a1570d5a06aba7

    SHA256

    7ff99293fad26f913ea12122d0cdc90affd4f6099d74c166381ef178bc624cbe

    SHA512

    e45f8b80aa06247f42dce23d93311983de7dd6e820025b400c4db12522aea1d40bdabc1c2a93435991ecf536c5e9eff9d573f3ee0de73e2bff5f0644a21dea0b