Analysis

  • max time kernel
    67s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    18-09-2022 20:54

General

  • Target

    https://www.youtube.com/watch?v=9e4KR9qbbFk

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://www.youtube.com/watch?v=9e4KR9qbbFk
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1712
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1712 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1080

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    340B

    MD5

    197e14aa37f54b282ae9d6e9ad3230f8

    SHA1

    059bd5e72c365f8fbe876ca9912ff5dc846f6944

    SHA256

    53f3f7e2b08c5ba31b24bf2791ec11ef1ba4c73d49b982479bfe69e7b8411a8a

    SHA512

    5da7978e39ce9c4bce14cf0d0a313ddd6d1b67c33c9c7809258beef7419630b3efad2fd694262ae1350aba083d442b21a1e6a9ecf1f344329dd947efcc66b5ea

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\1evexod\imagestore.dat

    Filesize

    5KB

    MD5

    4a62cc12757f46c5aba904e0143e5d10

    SHA1

    2efe1ecb93b0a56b991337bb2e782f9b1a0d062d

    SHA256

    95942d986a0a9d04f870cbc2724dca05ff6ed46bd30cc00457df553d6c0013da

    SHA512

    56c8a3ba17715e2a7e3f6498cec9af672a0dd41c9147f6d42951252d843999c3ba6ec54f68bc35f1039d9fee4e729197bcb77ff7c2ab9b81eb867ddd862b7fcb

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\THK0LA1Y.txt

    Filesize

    606B

    MD5

    18faaf276b6ec8dff532bbe7eecbe68d

    SHA1

    4638c670357b3a7699b45a83efffdac3d3042dd2

    SHA256

    d69198164fea8663e11ed03a70249e35b84160d267df4604b96e904ca3fea222

    SHA512

    10b02a323314c2e62ec9c39d51a7d0e9aff8352fd9b3b21b3eb65f49fccb830b4329a647d6fd9d23cffc2e1ff391ca5a04d1a97c7c2f61b4d97a6887eec8405c