Analysis

  • max time kernel
    101s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2022, 14:32

General

  • Target

    ڷVIPҸ/ڷVIPҸ/77169.org˵.htm

  • Size

    4KB

  • MD5

    98ee6e8383a3693b9aed0024c6c56295

  • SHA1

    ed862d3c419ea991d642c5b302df213e2cef03ce

  • SHA256

    516efd1450fb09e7afa5465a5e2b1c874aab81b0864e3ee1ac4a225d6a69a81b

  • SHA512

    5ceee4b944526aa67ba8a6fe1d9ed9cef118a69e526947b77215c47f7614302a5c7ccde13b75e6bf13eb2eba7e8fa6ef3f233aeb39819c19de1d095ffac85257

  • SSDEEP

    96:mQOQeRA2RWhwM6w6mheySgh/SnljQhhwQZy0X8LJhLoOlExbRls7zlaQLIak:7X8A0VdIYehu2hwQZx+JhLoOlExNl0zI

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 52 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ڷVIPҸ\ڷVIPҸ\77169.org˵.htm
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1740
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1740 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:536

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f993fd930129b338242f429b4a85b8fa

    SHA1

    246e64282caf83d9fe7b2983883323817c3a0ccf

    SHA256

    f8c22a59ec0dca6772b5e4aa91df5d4a7d491bfbbaffe1a30e4fa444661aad74

    SHA512

    67eb18f4ae55137bc51e99369b314f2c35c1da205b16319a6161d63103183827e14d3cf6c66621e59769e572c6b6e5ad195e214a9a8e33a242c460f048133dae

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\309axvf\imagestore.dat

    Filesize

    5KB

    MD5

    d04da80a7d2a98e3bfe818a9f6f27622

    SHA1

    bd38ba714afb44f223c533a19a6631b5e97fad97

    SHA256

    9d5e4062fb075c989f2038922ff6908c8e49ec9872ee40959260ec32b019e000

    SHA512

    5a10394129bf8edf64f57a1c96ef407e94f73cadf488c16c658d69c4b1d5bc6e627ffb9203fc2b2ed422d19c36e93409faf8c8a3d6fff1288a80fb6084433433

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\7EDQW4PF.txt

    Filesize

    603B

    MD5

    f0191f92939a135734e97075588a8e3b

    SHA1

    0209ab052ec36a71c1b8df6cb78c6c2809e82264

    SHA256

    ec200526585b28e9c564b51dff50be8bc58841ef5387df504d09af25a82340d6

    SHA512

    86c4d6fc34e4495ec619ff5154c61590ef94083dd6945a3fc1958d0edb6efdc100f4ad209c6e0e13998e3c4e75b94baa1d9f180de626c2315d1e1f33d30a22fc