Analysis

  • max time kernel
    87s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    28/09/2022, 14:40

General

  • Target

    http://bomgar.co

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 55 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http://bomgar.co
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1456
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1456 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:376

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

          Filesize

          60KB

          MD5

          d15aaa7c9be910a9898260767e2490e1

          SHA1

          2090c53f8d9fc3fbdbafd3a1e4dc25520eb74388

          SHA256

          f8ebaaf487cba0c81a17c8cd680bdd2dd8e90d2114ecc54844cffc0cc647848e

          SHA512

          7e1c1a683914b961b5cc2fe5e4ae288b60bab43bfaa21ce4972772aa0589615c19f57e672e1d93e50a7ed7b76fbd2f1b421089dcaed277120b93f8e91b18af94

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          fec5d251fcb39ea6d08d642a8377f79e

          SHA1

          6b3dd4914675aafb770435cb9f20ed985ee5ef9c

          SHA256

          92f7a4acee3c843df64d8301b145f20591fc49932114eba6df79c8fbf4152e5e

          SHA512

          a0919bc6668937ee02f7fa0e0d851c95847a72df1e2db5fa0a3c85ca36be202f8b83ac8ff938884e8e08476f7161edab3b00b160108069f76e32783a17693c71

        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\309axvf\imagestore.dat

          Filesize

          20KB

          MD5

          551ad8814690d9a41525e08b54c7d491

          SHA1

          73697278e3ea6ffbd5c6951f673186ef55aacb87

          SHA256

          4de118907186c762c706b88907a1e5eead6ef1ee35d584db041d6bf010a991d3

          SHA512

          5978207688f1a0272fcdfeb83eb33c4d64d3cbdc0e1c81befc3cfcca5db2816f77253aa1da0b2364586841cddac2e42f2d2034896edcab4a1b9ffab58d74f5fc

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\Y273RUBH.txt

          Filesize

          602B

          MD5

          6beca106f505aa0ae024287fbe359c99

          SHA1

          e4a83b92d342bedfc317df2d10a29587661589d5

          SHA256

          de9184fa9d33e3a068ae326a33f8492e6b5b70bd4984dc2ee731dce4c9bb9a2b

          SHA512

          7e42930d8c92be6d57628d0a686a7c79301384e4b0b6346d5667fb0d6a2521b4ab19ec3ff06c2a5f0b58963ca8dbde1e5bf0670c0b6947d26ddc13d976f36243