Analysis

  • max time kernel
    85s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    09-09-2022 22:06

General

  • Target

    http://pentest.lynxbroker.de

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http://pentest.lynxbroker.de
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1456
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1456 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:792

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    60KB

    MD5

    6c6a24456559f305308cb1fb6c5486b3

    SHA1

    3273ac27d78572f16c3316732b9756ebc22cb6ed

    SHA256

    efc3c579bd619ceab040c4b8c1b821b2d82c64fddd9e80a00ec0d7f6577ed973

    SHA512

    587d4a9175a6aa82cd8bb1c11ca6508f95cd218f76ac322ddbd1bc7146a0e25f8937ee426a6fb0fb0bb045cedb24d8c8a9edfe9f654112f293d8701220f726b4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c7cc671a08ec714fba89b34d4a2d0545

    SHA1

    71cf95a29c859ebf8bc6083381365d6736b7e863

    SHA256

    8e8a0f1b294efe924311b64a2845d1793daaa35ee21cc1fb3375325b8b985592

    SHA512

    2d35832c2e561d570608412e153a8b8234c863d8daf64ae79ead657a7ce594fda91727b38c856614b0162d89fcc6f5b16114a6963ad988c2ff327c43a673c468

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\X7Y2F4GS.txt

    Filesize

    601B

    MD5

    b1c3478eabb66a1c8570f34afb6e3f69

    SHA1

    a3a503d55c8027a75e28aac1071a9f08434813b6

    SHA256

    fc9b9746ac80406188eeed1e5e7a359c1c72be40f1cc33c30cf004727dcb19e1

    SHA512

    4329a41245e1272da68d4c79352a09fdcc2d99522a62f6238f55f8855fcc11a85c99a10259cdb28931b719979521e23031be86833084a472adc6412374f65e56