Resubmissions

08-09-2022 17:44

220908-wblklafbe7 3

07-09-2022 00:27

220907-arqnlaafh7 1

05-09-2022 16:52

220905-vdthjsehd3 3

05-09-2022 16:42

220905-t7p7jsegc2 7

05-09-2022 16:37

220905-t49f1sefh3 3

31-08-2022 06:37

220831-hdwlpabhc7 1

31-08-2022 06:32

220831-haw32sabhk 10

31-08-2022 05:40

220831-gcy5rahffl 10

Analysis

  • max time kernel
    188s
  • max time network
    220s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    08-09-2022 17:44

General

  • Target

    http://20.7.14.99/server/

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http://20.7.14.99/server/
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1720
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1720 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:592

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\309axvf\imagestore.dat
    Filesize

    34KB

    MD5

    126dc0b0fbf60f41af9ab9e9d9cfb322

    SHA1

    750e416d75b970d26398b24bf94a7cafa9c2843c

    SHA256

    e49f4b039f667f11753183a16091231eb2bccd102c94d40e97f78c53af346f78

    SHA512

    359ce844a8d9e8eb98f8978c2d3cc5716a84e26a9ff11c7be7137d334da11848b413db0d48709d97fe4b9eedeef34a4686254564e3459f92c6d3ab0cd201dbf3

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\31VARSVK.txt
    Filesize

    608B

    MD5

    215a1e5741ed09043a890450eae29301

    SHA1

    eb97889d46f18a145cb9c37442d2db73df7d5219

    SHA256

    a801a918d7ed71c551a5de5bfbb97e7515309b04306460e63bf239839d3c7c45

    SHA512

    162c01c17ad59b823e0ca7916ab142d16a41665ed365944cda4a16e2f45960f091b3ab76ec8c19aff98f22ddd04670f2a0e3b6ceb655f4a35b28355955608c07