Analysis

  • max time kernel
    67s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    27/09/2022, 18:15

General

  • Target

    https://cymatics.activehosted.com/proc.php?nl=4&f=57&s=7db35421827ecf3b25ab154932324280&act=csub

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://cymatics.activehosted.com/proc.php?nl=4&f=57&s=7db35421827ecf3b25ab154932324280&act=csub
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1960
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1960 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:1336
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0xc4
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1068

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

          Filesize

          60KB

          MD5

          d15aaa7c9be910a9898260767e2490e1

          SHA1

          2090c53f8d9fc3fbdbafd3a1e4dc25520eb74388

          SHA256

          f8ebaaf487cba0c81a17c8cd680bdd2dd8e90d2114ecc54844cffc0cc647848e

          SHA512

          7e1c1a683914b961b5cc2fe5e4ae288b60bab43bfaa21ce4972772aa0589615c19f57e672e1d93e50a7ed7b76fbd2f1b421089dcaed277120b93f8e91b18af94

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          1a1f72324655cd9ac720fdc05d360b8f

          SHA1

          5e6884c61142b5f5ba00f50bbf1238469077e209

          SHA256

          01ec08064d68d129d41c5d2c809e26b1e82209c2dfe6ad0cc45c29da7763bf79

          SHA512

          b6359a3f0cadc21b375b4a4c6b8bc731b009173f97526601fd48631a1fb29a380f1fa1ca8672ef686c9758ea28a70fb81aa2935c5ba21d7ab95a091bd6a81182

        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\tcz8fqz\imagestore.dat

          Filesize

          6KB

          MD5

          f918a3ac6195ca0a38aeaff57a268e56

          SHA1

          4c31b0a02c3b1308db4d15e9d998ff33a2ef5b2a

          SHA256

          96f726908823d2c8dcf4a482fab1e81b1bd225ac22ec49deac133b13222f8ca6

          SHA512

          63d65a183b5807fcdf2b8e85c03ce760681d6a79cc7750108f163f43cf68132d55c87c9d45a61810b89643fd35c499f488e16cb5ecf2ce036f6cc0098115a5c0

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\B5ITZ7SS.txt

          Filesize

          598B

          MD5

          f0b27a931bb7856b443b0aaba10e2f7d

          SHA1

          f0af09a02d426ce2412963db37b4fc77b6121bcc

          SHA256

          76d131d09e816116e428f938e8bef6137375fbf93246bfdd5ed5347fe7d14cca

          SHA512

          8205ef2df73006459514d4c01acbb80e4591afe8de0c0597f0c3e3520fdbe6f2e4bfc571b670478eb31d4aa2ae76963fdbb393c69545a275e45f01bffcbc3a57