Analysis

  • max time kernel
    149s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    27-09-2022 08:44

General

  • Target

    https://cybershafarat.com/category/hack/page/18/

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://cybershafarat.com/category/hack/page/18/
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1092
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1092 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1944

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    60KB

    MD5

    6c6a24456559f305308cb1fb6c5486b3

    SHA1

    3273ac27d78572f16c3316732b9756ebc22cb6ed

    SHA256

    efc3c579bd619ceab040c4b8c1b821b2d82c64fddd9e80a00ec0d7f6577ed973

    SHA512

    587d4a9175a6aa82cd8bb1c11ca6508f95cd218f76ac322ddbd1bc7146a0e25f8937ee426a6fb0fb0bb045cedb24d8c8a9edfe9f654112f293d8701220f726b4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    53470d304541f5c8cc87856e3cc53ebd

    SHA1

    bb5e3d2fdd98853b1944b6a0e8928822ff6e52ff

    SHA256

    c4ef7ff5b8470be73fc4db662121f6f48fcf5daf44f2097238bacac279f2e955

    SHA512

    991df9ea19a6303015c73b26c105b4593af5b0a6916f4cbc0f7a1862c87efd35e98217d46d399347c3ac6d0b6592262f1804cfe78feed7a7c839fb416d4c8ec2

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\lwrmjt1\imagestore.dat

    Filesize

    6KB

    MD5

    8e14fd7592014905f8df0c11aa0241dd

    SHA1

    c178516130993f74b518a6c38c302bc5cd7bb442

    SHA256

    7f0ffe2a61f24a9d8ef55d41d4c95aa5eefada21fc1f0134798ebcd15dc817e2

    SHA512

    018c15ab14473449d35ef11198597d94bdb6e69bafe0880784bf3f91f1a71da706aed9c281090651bea8d12a02436607a46ce078bda77f137a64fd7e76de9d29

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\G9J0CQ50.txt

    Filesize

    598B

    MD5

    415755860daab3a0f60c8aeb05d1a931

    SHA1

    19438d0eb24944ba209ae81cd6d5a9146c7352fe

    SHA256

    0290d93a1887960b5d56c2ede55f27704315d8ed34a0a59030014928c4b94d92

    SHA512

    4bb8d7f921ddac247ac04f998361d7406853465311b8326a1814ae3ddc16539b829a8916927f343910b34fd77935022ca1c051612dc53449645bb0d8e8449049