Analysis

  • max time kernel
    130s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-09-2022 08:44

General

  • Target

    https://cybershafarat.com/category/hack/page/18/

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://cybershafarat.com/category/hack/page/18/
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3628
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3628 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:4752

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    e12c82661cf68cf0eb64f50e0c68ce34

    SHA1

    a92b301c88611dfbd05a56b2d2758c0301e9cee7

    SHA256

    1ff3db3a11352a904d8ff5e2943786ffa250630a2d6a90375c8fb65557d3d251

    SHA512

    71eb9c0a25e1c39c215713d6c06c7068f861c73a54b07965e28e7125524726a70c6b335c48d1c5a6373673c3a76227dbd3f8a4c09ed4d858967ec112d30e7edf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    404B

    MD5

    cfc174065ee9c21ad2b48f61a01dcf5b

    SHA1

    40574be6787bfc6cd84ecfb09fac439396aa5500

    SHA256

    59a40aadcefb8dcb62e47f377c3606e8b84eeb8a9147b4b0651a2233179106dc

    SHA512

    f09059d09a911b250d09cfbdef244b36cfdb3d6bf40ecd7b84aba1601b6a45a75063f9c73bf05681631ba89dc92d0de39415b979c43f6acd6c5c89c78b405e8d

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\ru1r3yf\imagestore.dat

    Filesize

    1KB

    MD5

    7715abd113ea3f6ccfd36fae13140d47

    SHA1

    f2a1f281a67cb815829cad131e594000d22d9226

    SHA256

    f4cc8a3854df1a4b9907755ec0d2837124be8372d6275712fd6c93c744009f01

    SHA512

    df99ded88bdebb7e09246916f1c1aa7aa2836c59ad53108af2fcb8f679db183e0366dec2903bb9535f59c39ce5232fabb1f0b6ec5e80f184c27d32923cd6f7ce