Analysis

  • max time kernel
    66s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    21-09-2022 13:15

General

  • Target

    http://url9849.reportlinker.com/ls/click?upn=PNY3tIN1nBVCRfVXLm8fUeU2JCoALXmAgYqUB-2FMF-2FQR-2BWUq4D74sve9N6dEkBEwoyLlhNV6TUyRVq6JmYhcgwHfDF-2FEGBJpaqNBqQXeV-2BUch1cZ2RhCfyK8hvToZ32Pb-2B6iu41U0dIxCSEpWC22A-2BqArOFkwiRs1F7fNrsTNPuqdwMK-2FdvVYJjto-2FHh2OY1wYAmsaH7AkASc1T54vnQpum6kxapcQzbY3I4v3qlZhlQANMRdMw4xYD20QYvxKVVcuqypLn02-2BQAu9S0fN2nou1C3XaEdphjfiJEt9Wvokc4I2vFwGkaZtRhyssioYBQElct-2B9t6mSsj2y9IYzMEcqg-3D-3DqFMS_FyG9pgn-2BTDeRFyPXREvhVCU6ZcnThAei2YIH1d40MAImkQAg6A8y86AYN-2FTVxGWfyeYrx4Gzzt-2Byo-2FZWmUoq2fzfMDINlrf5gchEnCnDJAQlxc7hWU15M8f7EtPewqQFrOndrJd8MGfQpp2j0Bu3bUiGteo0LML8dFv6eEvR24dlJXNR-2BxcLxGASzgel-2FfbrIUaRRHSD1og5kMMkp2Zthkrg0MeuVlsVqcS5RZ-2BikkQYZ83wLlrRsiU-2Bh6CFeFJhMXlvzPPFRgMO2vJcCbKvywOp954fsDEw0D3NAlHl3Ny7fKJ9I10WworySru82FDZY6eBhzP4UoHU11aZpT1aVWcqfuXZ9788kzJZZYQWtqHqK-2Fsty-2BV0WRypmeRRZHBNTHi2fpDdOn7AQ7YocghWYQ-3D-3D

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http://url9849.reportlinker.com/ls/click?upn=PNY3tIN1nBVCRfVXLm8fUeU2JCoALXmAgYqUB-2FMF-2FQR-2BWUq4D74sve9N6dEkBEwoyLlhNV6TUyRVq6JmYhcgwHfDF-2FEGBJpaqNBqQXeV-2BUch1cZ2RhCfyK8hvToZ32Pb-2B6iu41U0dIxCSEpWC22A-2BqArOFkwiRs1F7fNrsTNPuqdwMK-2FdvVYJjto-2FHh2OY1wYAmsaH7AkASc1T54vnQpum6kxapcQzbY3I4v3qlZhlQANMRdMw4xYD20QYvxKVVcuqypLn02-2BQAu9S0fN2nou1C3XaEdphjfiJEt9Wvokc4I2vFwGkaZtRhyssioYBQElct-2B9t6mSsj2y9IYzMEcqg-3D-3DqFMS_FyG9pgn-2BTDeRFyPXREvhVCU6ZcnThAei2YIH1d40MAImkQAg6A8y86AYN-2FTVxGWfyeYrx4Gzzt-2Byo-2FZWmUoq2fzfMDINlrf5gchEnCnDJAQlxc7hWU15M8f7EtPewqQFrOndrJd8MGfQpp2j0Bu3bUiGteo0LML8dFv6eEvR24dlJXNR-2BxcLxGASzgel-2FfbrIUaRRHSD1og5kMMkp2Zthkrg0MeuVlsVqcS5RZ-2BikkQYZ83wLlrRsiU-2Bh6CFeFJhMXlvzPPFRgMO2vJcCbKvywOp954fsDEw0D3NAlHl3Ny7fKJ9I10WworySru82FDZY6eBhzP4UoHU11aZpT1aVWcqfuXZ9788kzJZZYQWtqHqK-2Fsty-2BV0WRypmeRRZHBNTHi2fpDdOn7AQ7YocghWYQ-3D-3D
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1808
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1808 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1292

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_1DC6D7385EA816C957BA2B715AC5C442

    Filesize

    1KB

    MD5

    e7690dcc048a0c6af31b34109e0a62fd

    SHA1

    f1b7f1714ecd7e32d9386cb5c2585594796d35dd

    SHA256

    be68d49119724361751f60c7d9cd897538a63813a8024d59a1439da04587df0a

    SHA512

    03e8caffc9362bb42b659df2a9665cbe98a1553028f87f3176e0e477c5eb5233779ea9913e2e13ce1420e925aaf2760649663ca65f6c14ca1905075c24357529

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    60KB

    MD5

    6c6a24456559f305308cb1fb6c5486b3

    SHA1

    3273ac27d78572f16c3316732b9756ebc22cb6ed

    SHA256

    efc3c579bd619ceab040c4b8c1b821b2d82c64fddd9e80a00ec0d7f6577ed973

    SHA512

    587d4a9175a6aa82cd8bb1c11ca6508f95cd218f76ac322ddbd1bc7146a0e25f8937ee426a6fb0fb0bb045cedb24d8c8a9edfe9f654112f293d8701220f726b4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_1DC6D7385EA816C957BA2B715AC5C442

    Filesize

    416B

    MD5

    93fe4094f52af69f256fe5e745248ffe

    SHA1

    32f6c1148135da8915dd2e5731ede84d22685691

    SHA256

    08dfbc461b1f442aee183d676e1a0065e790a02243bf5c3f2264c1deeeb0efa2

    SHA512

    f2cca2779a2b9ee6011d405ac47b287f9d0632465a1f8d20dc24911cc4c617d6818c211d9fed6b15bbc8035bd9573a8bcb2c5396225982e45492219d76399c0d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    37f2d67fa22f264470ab179bae6c155e

    SHA1

    91ca479d5994aaf4b610fdfef76e75f2aa3e33e2

    SHA256

    09978508b0cd5ea766bb7f31cf845ca767720b6387e3ddd47f005b798068af8a

    SHA512

    5b2f5cbc353e015d28235e87a10e490f46e506b3887ca467f14467e6f40b87130076c44f550b5eb8cf5474d61c968d45b69f45f443964346393e28353ec392af

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\lwrmjt1\imagestore.dat

    Filesize

    5KB

    MD5

    7f267050d3fb98643079ae394fdc7536

    SHA1

    b6bc43db683603bd4ebe840d8fd355dcd1d41d1b

    SHA256

    7f5173ced677041c64ad0f0f15b7c39190f06106bd8af7584612b5b08c79a871

    SHA512

    eb45fcbb0583b946482eb8023a9cc365955072d9fde854e0b9f3885a8b907721e5122767d3ebaa493f5af048c49c531500efbaf78a69d09b6c673cc34d322a0c

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\EOJRZ486.txt

    Filesize

    603B

    MD5

    c28781c5de21ffbbe1b02d1719cf42ea

    SHA1

    469cc0bf24e96f761402f7982bce2838cd5f2452

    SHA256

    84335d113b10fb038458679c88b9418e6f5fbc435592d7b71746982860248839

    SHA512

    55beb1e95c7c14443e8fdc4810ec0329aead6f7f99806b580c6b9bc6831da599d362e2fb51bad7a4a87dac54e6813d003cfcc7c88c0e59607a5ac0ce5e94e86a