Analysis

  • max time kernel
    131s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/09/2022, 18:58

General

  • Target

    http://icanhazip.cm/__cf_bm=VoZRijlk3TkNtn7XsRRMROLFOuUI5cm_GabsXKKImm0-1663267736-0-AWlusF6mg8eh+nkta4wlvbf+ojD0C1b+8oBf10vIgSPu61GRWXKmsZzVJ4bj/DTP1hxgGW6ORW1RE+CJ5jGhV6w=; path=/; expires=Thu, 15-Sep-22 19:18:56 GMT; domain=.icanhazip.com; HttpOnly

Score
6/10

Malware Config

Signatures

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" "http://icanhazip.cm/__cf_bm=VoZRijlk3TkNtn7XsRRMROLFOuUI5cm_GabsXKKImm0-1663267736-0-AWlusF6mg8eh+nkta4wlvbf+ojD0C1b+8oBf10vIgSPu61GRWXKmsZzVJ4bj/DTP1hxgGW6ORW1RE+CJ5jGhV6w=; path=/; expires=Thu, 15-Sep-22 19:18:56 GMT; domain=.icanhazip.com; HttpOnly"
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4824
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4824 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2256

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_1DC6D7385EA816C957BA2B715AC5C442

    Filesize

    1KB

    MD5

    88d1983f31e8acde3c232ccaf80eccbc

    SHA1

    0906cbad7b043b7838f3384597e1f3f84cfa8c98

    SHA256

    2e5e206b190a3bb5f892a3270c6146014b775b6ef6c254d74643ef8c472602d0

    SHA512

    4bbda7d006aec718c2b3a817d2a57d4ce4003565d314ca6c8b53f57fd2257a466954d80ecf6113d3c632f14dfec5f7a9a2a771d3c2a60656e86d48f3abf8658e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    64516f819c8da76f402e4b40799ddadf

    SHA1

    d8582566e6b62bf032adac5699c1649e3a009f94

    SHA256

    471042636f1151ffc6880459c33a579f669808e93f2043a073d1c8af241e28d4

    SHA512

    431396796a20d97b545e4cf07646b8ce5c9e47c198bd9f24b9d1546064b7acd60f3828eab3c52ff43db3d5b4814466176421d42d183795b0e04d6d10bdd07c97

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_1DC6D7385EA816C957BA2B715AC5C442

    Filesize

    416B

    MD5

    9b64a114ad059385778411621fc6806f

    SHA1

    05ab6230fdf04f938c109dd5aa63c72fc08783f8

    SHA256

    ecece0938c2eff6dbc5820b59e54ae1ddef9c3016efb3d6b0be8dfa967f911a9

    SHA512

    bf28994d7b2b268339f4b413676b8a907a2fa58ba6ce7c5f34dc9390effe1a1bcbfbbd3f8e8a4eb258076f87399112ea5c6dc7e3b90cee6bee6e69fa97ab256a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    404B

    MD5

    f241c4ec774dca2f4f9ca6b7c9563813

    SHA1

    f7737674d3f1b745857e7a7ddf39c34995fe752c

    SHA256

    c5a6be4ba8365fa0243c48e0b97dec606cb93f7db3de635a81b7c6ced21dfe17

    SHA512

    ce4ee27fbacbe3740822b1a4ff3e61274233cc8738dbd180349da33335487e7db2b8765c10f5a5ec27539e3ae07e80af2b1ef8c860d376ce0f8b5dcd8d5d1eff