Analysis

  • max time kernel
    131s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    14-09-2022 00:53

General

  • Target

    https://linkprotect.cudasvc.com/url?a=https%3a%2f%2fwww.yumpu.com%2fen%2fdocument%2fview%2f66264683%2faviation-weather-4th-edition-peter-f-lester&c=E,1,XVQqJi7Px__aLXiDFTJPPrgrl_cg5YBuT1KyNAWe0YscwwTVtOEUeiJZzxrUMBg2GR3dXo-K_Jv8VCOc6mOIpQaK7JzkkXhodW9exTPzuvEhYxa8&typo=1

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://linkprotect.cudasvc.com/url?a=https%3a%2f%2fwww.yumpu.com%2fen%2fdocument%2fview%2f66264683%2faviation-weather-4th-edition-peter-f-lester&c=E,1,XVQqJi7Px__aLXiDFTJPPrgrl_cg5YBuT1KyNAWe0YscwwTVtOEUeiJZzxrUMBg2GR3dXo-K_Jv8VCOc6mOIpQaK7JzkkXhodW9exTPzuvEhYxa8&typo=1
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1600
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1600 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:1944

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8a30b5b7c61727d6198a63c152c4e065

    SHA1

    e3e89ef40974ecce029279e4c5838257fdb39b0b

    SHA256

    4a083ab2c751447f5035b0d82bcc344860ffb3ae2ae9e384c37426e95b188b23

    SHA512

    622f1a7fe30db46313b4c88aa096a074df237f57b1019fa7bf7d58f4cfd6100a9fa7f3c703c55c5a28d71da52021a23b6a7947fc2ad467e0660df24f25d7bbc1

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\309axvf\imagestore.dat

    Filesize

    5KB

    MD5

    1aa9781be64cc32a307e34c52990509f

    SHA1

    d0bd549746557bf53eca54c1a09a3111d7ce7a44

    SHA256

    2fb731b55610e7b6efe93e142bc80695bc4c857adf0fac0499eca600fad0710f

    SHA512

    99e134c4e36701336541ac9395b66b080d68a16bb6039cf15bcf870dbe7a65493a6bd64026c6461a612c5063be7c4a7343c3fac171851b82c30b72be143c7852

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\6WF2EV3U.txt

    Filesize

    603B

    MD5

    252ede4070db5138aa9ce20f31526a6a

    SHA1

    3d49d748324d4a71acc5f860f46de7ce4522d5f9

    SHA256

    b10a5185b70c2daf856c2613b2c09ffac3123d122f7cda09047d833c1326fa4d

    SHA512

    65850ce3a21cc7620bae6b44fa1e20a8cee510285402c1758e05578e9f3d2c004d3201c86e0cdba4706dd69d710a433deb0914e9ba2b692432ecfe091d58f5c1