Resubmissions

08-09-2022 17:44

220908-wblklafbe7 3

07-09-2022 00:27

220907-arqnlaafh7 1

05-09-2022 16:52

220905-vdthjsehd3 3

05-09-2022 16:42

220905-t7p7jsegc2 7

05-09-2022 16:37

220905-t49f1sefh3 3

31-08-2022 06:37

220831-hdwlpabhc7 1

31-08-2022 06:32

220831-haw32sabhk 10

31-08-2022 05:40

220831-gcy5rahffl 10

Analysis

  • max time kernel
    199s
  • max time network
    227s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    05-09-2022 16:52

General

  • Target

    http://20.7.14.99/server/

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http://20.7.14.99/server/
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:748
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:748 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2008

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\1evexod\imagestore.dat
    Filesize

    34KB

    MD5

    58cedd70e1ede93c9b77d6ad2eec8255

    SHA1

    b0ac3577769f21df943d6401d807c1d2591dcf59

    SHA256

    525dd2201fdf34a0f694c500f4baaaa00078de5a20cd764fb9ca602b47263271

    SHA512

    4dca18d45160c405ae563266475f0e23b61295b39d4f01d9e6f56fbca8c51e464d3c4a796c00a3de140939f395bbedaa15f34f3fe9d183d1a003e60d58390397

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\MSI1A23A.txt
    Filesize

    606B

    MD5

    a83e8ec6bc6d815cc1f8acbfe9620014

    SHA1

    6c631ee31a3296761bbfb86b60b9ba4758c22e38

    SHA256

    96bdff29c8ce6901fcbf018cfccd0ba1f3bdc5afa0c705b012c21072e7f605f1

    SHA512

    55867dd864458c90ca2bc61c0d36b2552b5ce358a46590e036d5803ed896d8cba5ad9d0a422fd5fb9c542d6e8ec627211be14396d386b922ada81ac7644900b0