Analysis

  • max time kernel
    76s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    28/09/2022, 15:29

General

  • Target

    http://beyondtrustcl.oud.com

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http://beyondtrustcl.oud.com
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1500
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1500 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1376

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

          Filesize

          60KB

          MD5

          d15aaa7c9be910a9898260767e2490e1

          SHA1

          2090c53f8d9fc3fbdbafd3a1e4dc25520eb74388

          SHA256

          f8ebaaf487cba0c81a17c8cd680bdd2dd8e90d2114ecc54844cffc0cc647848e

          SHA512

          7e1c1a683914b961b5cc2fe5e4ae288b60bab43bfaa21ce4972772aa0589615c19f57e672e1d93e50a7ed7b76fbd2f1b421089dcaed277120b93f8e91b18af94

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          6e48e1283208f9a8adb667ee83a6fd30

          SHA1

          0021f14c9a8c7e58952823e70875e3d074d617a4

          SHA256

          19ac026ccbd9961f73827d119919ba2e5d328e4706d0f3941217310557362192

          SHA512

          42431399e0df1aa1e4eb46bb2c4d0d98431337b96aea40ab70a269ea520c3135a37ab0b6583f1caeb24dfca7708ef5a09b53556bad4be39c05b9832b1b730d2d

        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\lwrmjt1\imagestore.dat

          Filesize

          4KB

          MD5

          769303c0df6044a6351325ad85d5cee0

          SHA1

          1f6465cb9db248aafa9d4e8087dba33692d5155e

          SHA256

          60f538c35ca0395a177a343060720a33317aa089aa6d2b8a9b0a4bb8077d5acd

          SHA512

          78a0b8e02451dc1f4a9a44b85a315e17c9fc9823d1cdbf225a12de20437a8f9406322a583552cdcf4b013c7a078cbff379aa30340e300ac663f055b7b70d329e

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\DLOCK256.txt

          Filesize

          608B

          MD5

          474bdeb4bf8f814ceccd0ed0cce252d3

          SHA1

          e0d81426e9bdcd386f9000688f7b9c3be58910c4

          SHA256

          f471573219722f6d32791130ed5e6728dad2aa1aec675e438db19bb30659a3f2

          SHA512

          7e7ef273cbf6810feabc1853b930c6f5a78baee297a4087af8c4125e8adf7181580ab7172a8862e31cb63dac68c0a2f8c2e07bfb89c40fea83c5443b653355a3