Analysis

  • max time kernel
    66s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    18/09/2022, 06:21

General

  • Target

    https://falcon.crowdstrike.com/investigate/events/en-US/app/eam2/investigate__ip?earliest=&latest=&form.sourceip=10.125.111.255 https://falcon.crowdstrike.com/investigate/events/en-US/app/eam2/investigate__ip?earliest=&latest=&form.sourceip=10.125.111.255

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://falcon.crowdstrike.com/investigate/events/en-US/app/eam2/investigate__ip?earliest=&latest=&form.sourceip=10.125.111.255 https://falcon.crowdstrike.com/investigate/events/en-US/app/eam2/investigate__ip?earliest=&latest=&form.sourceip=10.125.111.255
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:960
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:960 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:520

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    182bb751c6bf1ddac2edd9567f8f1027

    SHA1

    40c5fd7d8e98951884ace13aeb22c72aaddadde4

    SHA256

    0216c679d8e95f5b8467e580e920a9624a821a1fab9b401635ce87aa1b64422b

    SHA512

    e1ce4724b926330898a406688e5a1c39fc157cfad157f98c86b62c8eb5aca648905a4b515366de25f6f672ad6433955f7d4ed057048f4ee46d1a3f39e4427fdf

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\XCYYZROZ.txt

    Filesize

    603B

    MD5

    318d5dd8d9f9f308ffdd1af69b46bc8b

    SHA1

    0d2dfff5c41dcd825c95a2559fe7eeefeaf67ac6

    SHA256

    bdd60f2b62428494aa7b7406d5048d3cfed56695d3e27c7eb9c12f7799298be0

    SHA512

    0adaa30e94cb7dc554d5e7d80dbed05906c5c89ec68917c62251317bbd1a6633a158b8cf775687681015da5bd690768b0f9aa6a1424426445179dbe3f5fc4d7b