Analysis

  • max time kernel
    71s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/09/2022, 18:42

General

  • Target

    http://29localeen.dropbox.com

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 49 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http://29localeen.dropbox.com
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1092
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1092 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:4912

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_1DC6D7385EA816C957BA2B715AC5C442

          Filesize

          1KB

          MD5

          15c2699d6f4a75020c8d3cd8bc90411a

          SHA1

          41ac344ce50f4b2e508d2c0160075dbd21601767

          SHA256

          481a593538444cd886a7c06694e6420be19eb19eed290a7cf1a17044a4f09133

          SHA512

          d9b6b4f640a5bcbdf7e2914d82fc91e927a214196ce5f396de1c386399f05f9bb1a287210a4f57e4ca60e89fd0f66164b27aa385d8023473c21286f78136f589

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

          Filesize

          471B

          MD5

          1520b1f0e8660cc8553264ce46871efd

          SHA1

          70c43f2c0b7599f782461590f8e1650a2df5dbfe

          SHA256

          8bb8dd5446da57093db31c10b4093a2378a9324f137d3eaa21ab0027e191c09e

          SHA512

          6ad8d5f620738988286981654070c9a4e2542f629f4e5245381143a2a88c98922145759ff8d90546e1a617639a7dd335ddca4aba5435fb216c01c705bc4f0be0

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_1DC6D7385EA816C957BA2B715AC5C442

          Filesize

          416B

          MD5

          e1ee7361626cfcbc9a191f6d9d463a2e

          SHA1

          5bfd54d8289cb4fcd8a0c0170c188c471884dc8a

          SHA256

          a1462bfba1a5ceafdf1648ecae137a685b32f95174926ca51871a60de63c5591

          SHA512

          6d28d5e6c79ddc15d2221b3f38303edfb39e774c20ac1a96c440bdb5ee8296dd793330749404e5910f00795d9e3490180f55f23e9bdf6bb1a796ef827cafbea4

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

          Filesize

          404B

          MD5

          aed47279dcdfaa7bd6a11f52d9564718

          SHA1

          c337611fac003cf8b5597ff166eca49a5ac7ad7f

          SHA256

          2ee578b610681aa99c62e077ea4d810254054e2668d36476a7c87783b2e54a63

          SHA512

          0a421e593c0cfb953d8671bdc06e8bad57388480704b9634325ccdf0747320ab9198fb1b43b530d9757bc28c0c0d50610d183a9dc81fb756930260d306d27747