Resubmissions

08-09-2022 17:44

220908-wblklafbe7 3

07-09-2022 00:27

220907-arqnlaafh7 1

05-09-2022 16:52

220905-vdthjsehd3 3

05-09-2022 16:42

220905-t7p7jsegc2 7

05-09-2022 16:37

220905-t49f1sefh3 3

31-08-2022 06:37

220831-hdwlpabhc7 1

31-08-2022 06:32

220831-haw32sabhk 10

31-08-2022 05:40

220831-gcy5rahffl 10

Analysis

  • max time kernel
    429s
  • max time network
    433s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    05-09-2022 16:42

General

  • Target

    http://20.7.14.99/server/

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http://20.7.14.99/server/
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1512
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1512 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1984

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\1evexod\imagestore.dat
    Filesize

    34KB

    MD5

    a91dfe624c58272b0ba639946dc53861

    SHA1

    3b29eadfcdc959a6931421a4458e19dd223ec901

    SHA256

    c5774ed8e07166ac49e141c8bf0d50b1a332e3e48df2d5de12403a7e073614ed

    SHA512

    b1df491c8031398140ffffd808eadf0b7d4c63b2be6df5ed15ff0fcc4593a3ca7d6026cecae3f9c41e66b0ebd020fe82546622c46b47b4acb47e1624145d3e79

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\MK8YK3QV\favicon[2].ico
    Filesize

    30KB

    MD5

    6eb4a43cb64c97f76562af703893c8fd

    SHA1

    c50c4273b9d2433c6069454f971ed6653e07c126

    SHA256

    1d7c95c5eea00a8083a95810f902682f9e26e7fbb7876b022a403642d776d0c9

    SHA512

    3bae9380d8f0d45617ecf9d0d43818b7f8f83b61ecbd5e6dbd189c19d5853f92aa47965ad257cf712e49c03652f129dca47e8a8dbd86d62e614acc99ea931181

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\Q2YRUZVW.txt
    Filesize

    605B

    MD5

    c9ab491a3d7702fc08eeb63c8dc0b359

    SHA1

    cce9cb087817f04e1e5bb9f7d374f025858ecb89

    SHA256

    cff2e303a5ac1e997672b791eafd74ac0212842ad995d09ae8f65263a0fcb07e

    SHA512

    4a5f70a99707500e75465cbf3ea1dcce281a10b9034281db6d9173db86415338f9700d44ee7117fe130da13b66b18e1f7ca12b6eb96a3c45bd5ea6fd85940d90