Analysis

  • max time kernel
    145s
  • max time network
    147s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    28/09/2022, 07:37

General

  • Target

    http://quarrelaimless.com/mkj9tyzh?myp=28&refer=https://vidstream.pro/e/xeylw9zw3jvn?sub.info=https://fmovies.to/ajax/episode/subtitles/a2fe36e607d27fa935675e908f6cabd4?&kw=["house","of","darkness","2022","1080p","web-dl","dd5","1","h","264-cm","mp4"]&key=e35fff0d600aad048bac0f7b692e007b&scrwidth=1920&scrheight=1080&tz=-7&v=22.8.v.1&ship=&sub3=invoke_layer&res=13.31&dev=r&uuid=d8b10da3-1d2d-437c-8600-9a3ab82d3656:2:1&adb=y&adb=y

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 49 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http://quarrelaimless.com/mkj9tyzh?myp=28&refer=https://vidstream.pro/e/xeylw9zw3jvn?sub.info=https://fmovies.to/ajax/episode/subtitles/a2fe36e607d27fa935675e908f6cabd4?&kw=["house","of","darkness","2022","1080p","web-dl","dd5","1","h","264-cm","mp4"]&key=e35fff0d600aad048bac0f7b692e007b&scrwidth=1920&scrheight=1080&tz=-7&v=22.8.v.1&ship=&sub3=invoke_layer&res=13.31&dev=r&uuid=d8b10da3-1d2d-437c-8600-9a3ab82d3656:2:1&adb=y&adb=y
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2696
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2696 CREDAT:82945 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:3832

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27

          Filesize

          1KB

          MD5

          9f2d56f4004dcb03980839299b8bdf22

          SHA1

          0fb7fe26e552fd15cfcf173df9a4a9c77810045b

          SHA256

          7c0f63236995ea903c8cac60d3b994fffcad4e956fcdc804c0ebbd602ef045f0

          SHA512

          39dc994dd920557ede5b842f9e42911fd92c36603db8fa7155895d519e9786f35ec0eb35432ca9fbe788d8f2b4fb8a51ff348eee51d2218d51b830acf11e5a82

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

          Filesize

          471B

          MD5

          e12c82661cf68cf0eb64f50e0c68ce34

          SHA1

          a92b301c88611dfbd05a56b2d2758c0301e9cee7

          SHA256

          1ff3db3a11352a904d8ff5e2943786ffa250630a2d6a90375c8fb65557d3d251

          SHA512

          71eb9c0a25e1c39c215713d6c06c7068f861c73a54b07965e28e7125524726a70c6b335c48d1c5a6373673c3a76227dbd3f8a4c09ed4d858967ec112d30e7edf

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27

          Filesize

          408B

          MD5

          865351d3a2362d315dfe4abfe7ebb7d3

          SHA1

          ab9e3e89c9296938f3ce81a9100f1419c68335f5

          SHA256

          8f294312a374504d64b72a5a552bc1c6efe75196d4901309d4b90a28239b52ce

          SHA512

          ae75e3f488b9abdc17f32040d8657c6a9e5920563fa8544afb3a6e01a0a0692594aef372db85d83d2c0b4231bf96442f2b26dd16f645c1b5647fcfced7cbe89e

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

          Filesize

          404B

          MD5

          0cb501fa8c121f79f5b13400fd4a66b3

          SHA1

          3f9c740f0a18a6c505a617471f8ef1ec46ceb4d2

          SHA256

          6959bd906693ca5a7688e05f08beb37786470374a58b01e301615246628bf092

          SHA512

          56983b7255f8da25725455081afac1fb42ae85f7778ca078b27db421e4e1cfcb06ee5e4269cb287de0b15a2c745f4631e926c17674982ac380a1ec3daf34ce14

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\2Y59DCWY.cookie

          Filesize

          610B

          MD5

          94217e63d94e813716b6e828956f35c4

          SHA1

          e3286ebda4ff6b705a875e82f1bff068753bfc46

          SHA256

          57530dfa8f8b2661b2f3f5a99e19865f80ea09ac7bd3ae426ef62cb01b2f70c6

          SHA512

          97347200a55a061242bba7e832263270e99838a7da058157b117e0ce1f7ea1aaca0b7a457ced7c096fef5c41b006e1c71dc824a4712a63ec5baa983ff63deb5f

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\XW62EMAI.cookie

          Filesize

          610B

          MD5

          2a18515cde5b942b8562e94a40786753

          SHA1

          b00735d0027ccab29438b8ea29b181c5595d318d

          SHA256

          355c672dbbcbe761dfa0bcbe2b919be20e0f59f5c83722b6f6c96b4b6e0f4ed3

          SHA512

          93ec8e58f2e0a96ff39cf72cc26c73a6a4b50896085a38b4a3ec0f7a0c54960c7b927dd83766479889e53fbc0aaea948854192c051b0913172745d145926c9fa