Analysis

  • max time kernel
    66s
  • max time network
    136s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    17/09/2022, 08:39

General

  • Target

    https://cdn.discordapp.com/attachments/997757350008066179/1020599663193227314/krnl_bootstrapper_-_Copy.exe

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 30 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://cdn.discordapp.com/attachments/997757350008066179/1020599663193227314/krnl_bootstrapper_-_Copy.exe
    1⤵
    • Modifies Internet Explorer Phishing Filter
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:736
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:736 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2044

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          340B

          MD5

          b149c7bbd9dbfbe7eb98a6ae944ed9cd

          SHA1

          1870e49c60f03375fa55c27235536aa5a7c63263

          SHA256

          f495e4a68bfca09b0624d25c322b65fead7991c68c8333de8929391869687f5e

          SHA512

          b80ea594aa49746f36a5af4171d14cfdb786507fab7579efbce1e220dc834704ea13612f35767c6931979971f3b92928247cb10e3817ef049a6c92ee37751b87

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\IFMD91RL.txt

          Filesize

          608B

          MD5

          7b5e7e5f1eefacb31b3cea23c0b2be80

          SHA1

          61a19ee1f1699c68300b6b3e6485b4e1608f4881

          SHA256

          08f56935041f509924730e200084f9731127c84d0668609c8c23c0d070ed452e

          SHA512

          d04680a623e89835314b8c288c1ff5239dd88b4fa93c1ff6156176e52951aba52b8e0483644c86f3af6048a770b2f0e925469f30e6512917bcbb0dcf89ee8927