Analysis

  • max time kernel
    68s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    07-09-2022 08:33

General

  • Target

    https://trk.klclick.com/ls/click?upn=2btXoWEcr4c-2FeKSimYetAxD6d4iBIVXiwSZH-2BA11K5fqkvbvLMSC4iM3TgONzGXZH4B9SWa7aSqcE3h3nHk4-2FmyNuTsFXdG0A2pbi4a-2BZ42rIcEKTnFY6vxcLxSF-2Bk-2Fhgvdk2VFKzNkfQXwIdtNqnJoRWS6pgykfdHmvw4X9uKmGHPVmKLU4nUnrl7zJhKlRIzwOBsQfa4f45JQhqV-2F6IdPqCApVaSkR8e0FJmXWwvr-2FicZnCqCxvstXsHqOQTcXN4S-2BWSAW

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://trk.klclick.com/ls/click?upn=2btXoWEcr4c-2FeKSimYetAxD6d4iBIVXiwSZH-2BA11K5fqkvbvLMSC4iM3TgONzGXZH4B9SWa7aSqcE3h3nHk4-2FmyNuTsFXdG0A2pbi4a-2BZ42rIcEKTnFY6vxcLxSF-2Bk-2Fhgvdk2VFKzNkfQXwIdtNqnJoRWS6pgykfdHmvw4X9uKmGHPVmKLU4nUnrl7zJhKlRIzwOBsQfa4f45JQhqV-2F6IdPqCApVaSkR8e0FJmXWwvr-2FicZnCqCxvstXsHqOQTcXN4S-2BWSAW
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1928
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1928 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1768

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    60KB

    MD5

    6c6a24456559f305308cb1fb6c5486b3

    SHA1

    3273ac27d78572f16c3316732b9756ebc22cb6ed

    SHA256

    efc3c579bd619ceab040c4b8c1b821b2d82c64fddd9e80a00ec0d7f6577ed973

    SHA512

    587d4a9175a6aa82cd8bb1c11ca6508f95cd218f76ac322ddbd1bc7146a0e25f8937ee426a6fb0fb0bb045cedb24d8c8a9edfe9f654112f293d8701220f726b4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    03b4ece047df99c4a1866fc07e3d4efe

    SHA1

    3109f8af1c05496efed744d0338d0054b3132a86

    SHA256

    e3110e6ec8330ac6acd8a9c97fe7f3330dc04a01aa6cdfd406587af1144fc2fc

    SHA512

    776e605b6b3ca82271fa87eaebf8dc5e9781981df8591ab5ff8fea95490aed9a3a7d501240f243dcab96ef9a59dfbcdfbb948130e95aecff1855361df21fecb9

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\THK0LA1Y.txt

    Filesize

    606B

    MD5

    e0539efac03ec9852da07ce56f802a4e

    SHA1

    892c985ad5dbf777abc312a41a2f1e126afef85c

    SHA256

    2c854cc166c28280cd31772f5d10ff3ec86cd1aa1e6bffd172d4a7fdd7c5d11e

    SHA512

    90ce02dd60606d2bf31d62b4e7061be41dd559cf1a750b6534627f3850e01a1cebaf210332a98e6344cf2fa0366f731187b2fe1248ae8de2e84b6d8770ea5948