Analysis

  • max time kernel
    135s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    12-09-2022 02:40

General

  • Target

    http://my-gov-au.top

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http://my-gov-au.top
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1404
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1404 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1568

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    60KB

    MD5

    6c6a24456559f305308cb1fb6c5486b3

    SHA1

    3273ac27d78572f16c3316732b9756ebc22cb6ed

    SHA256

    efc3c579bd619ceab040c4b8c1b821b2d82c64fddd9e80a00ec0d7f6577ed973

    SHA512

    587d4a9175a6aa82cd8bb1c11ca6508f95cd218f76ac322ddbd1bc7146a0e25f8937ee426a6fb0fb0bb045cedb24d8c8a9edfe9f654112f293d8701220f726b4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    16a942b2d3edef117bcb82fcc65de2f4

    SHA1

    8acce2a11bce05b2852540453959697c8f938ed7

    SHA256

    b34f9976e1c1f3cf75e4182b2ea76ed5ad0940574e25d0f913b55476e59e7d48

    SHA512

    9294b70551f0170fca63b53efd6af586d48ae1650036d6e34ff21486203d049bf75805a7c2a2e241e3e3b58b89584622401d6d78bc7b698e40fa081eb49dc0ac

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\tcz8fqz\imagestore.dat

    Filesize

    72KB

    MD5

    d120cf61668cde47d684d58caca6b434

    SHA1

    df7efa51f0c2afe75e19ab01652506eb2c9a0706

    SHA256

    8b15b6b41a668cb5f0b09f5bb2ddeab49397ff41bcfd80a75212372fda330b8f

    SHA512

    f0552c6c5c663345cf8e45c86a29b7cbfa4b9542230eb9f39d450b13135adfa671b1e7d70c877e896084fdab1af1b7e6d8dab792b17ef26818332a42801c261b

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\I9NA5QYV\favicon[2].ico

    Filesize

    33KB

    MD5

    2611627c5c793c565447a717f07128db

    SHA1

    7cd02de9999f1c533f1a12125779f1a2c2940e09

    SHA256

    b87ab957e61db22ee722cd0b1747ec8288b8088c2e6c057ca87926b0713c981b

    SHA512

    a816c95636d3ad63d21bca8330d63b37186efd88963345f257fe18fe026aba9496d6322ad5127b7dda7a1f56d56018ef9564931855eda1b95250b34984bfe393

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\QV3FMNQV.txt

    Filesize

    603B

    MD5

    1dbb60aaeaecf9e70eebd1d82a19f6f1

    SHA1

    c1702bb8ed300b6a8dfa73ce3953ebeeea921cc1

    SHA256

    18213b1e734b61a3388298082110e6f7efd06d3f50456eb1b8aa60288de89e21

    SHA512

    3f84febffd04b870754ee1f502f3f0c3f521975f047d004caddb71e00eb8f5176886413a19ba534f146b00c74c664e1818e4fa07e8393312200c56006d5fc3a5