Analysis

  • max time kernel
    78s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    08/09/2022, 16:29

General

  • Target

    http://smilingaardvark.com/wp-includes/IN/

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http://smilingaardvark.com/wp-includes/IN/
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1708
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1708 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1932

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          1a2e9fad1dfc8a30e34aa71bce1bdadb

          SHA1

          a6782468dcab8fe8f4fdb6697f22d7eb293327e7

          SHA256

          3868ef64785824440d7ed2a9acbc38a76d350a70a5b77fb3dd316a66880602d5

          SHA512

          10ce8a445a23522c379f64934aab551a07088ca988f3bf74e32377e2d64087ebaf050444f0e406282f457449c46079a6479e080d9ddff1d3571900b6bdc4ba1b

        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\309axvf\imagestore.dat

          Filesize

          9KB

          MD5

          513ac33642b54dabb93b090c3cc94292

          SHA1

          bdbc02ca2ebd14b0b0bd7284b5686aa4295b94b6

          SHA256

          e762527b1ea350e31fe6e467a5e828b063d5e938c323210f188ee65d8e25fc03

          SHA512

          59bf070ddf9d23574c5c001874615ece690cf652e5fe69fe297dba7cfd44c6440a2e863041dc9596dcf18494cecbf7453c6ad76ed4a40aa2a151ebc04f8114ac

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\1HKQOAOV.txt

          Filesize

          608B

          MD5

          46d762a65f46ca4126f674c518cf2366

          SHA1

          09f951e052bdf8ddfe4148e06f4164a83daa36bf

          SHA256

          59fc65d9a430dd0ab47581cab0eb7955ec4a91a399c882006ce1f68b9fe8e7d2

          SHA512

          75549225d04bf8bd6ab804e86ee5e633b9c2a50c6eb57cbeec675d4b5272524e5f8892fa62bc7a848a0ca74af3b2e3adb89818a6325b09d96578562edbb897f6