Analysis

  • max time kernel
    66s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    29/09/2022, 05:07

General

  • Target

    http://apps.cloudhealthtech.com/

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http://apps.cloudhealthtech.com/
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1652
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1652 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:576

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    60KB

    MD5

    d15aaa7c9be910a9898260767e2490e1

    SHA1

    2090c53f8d9fc3fbdbafd3a1e4dc25520eb74388

    SHA256

    f8ebaaf487cba0c81a17c8cd680bdd2dd8e90d2114ecc54844cffc0cc647848e

    SHA512

    7e1c1a683914b961b5cc2fe5e4ae288b60bab43bfaa21ce4972772aa0589615c19f57e672e1d93e50a7ed7b76fbd2f1b421089dcaed277120b93f8e91b18af94

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fff7cf3430576aff55c3fa1d7f2ea498

    SHA1

    612d00ac155311cd26125e6d1d6d2eaa83d023ea

    SHA256

    3526e0f0b3fcfe72024162499ad8915490dd76d5a53cbbd8b630997845c542d4

    SHA512

    ebc5dfd4b509d454c59e1889e85a052ed0955aada9fc7605ede96c08ee65b95ef674e79fe0b0b6d1d56f0750c7349da764ea604ff1ac76b05a91c77aba6ee70d

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\309axvf\imagestore.dat

    Filesize

    366KB

    MD5

    47a514ee8c4ae0e551af91c22ce361e7

    SHA1

    e093c15e749a30a7cfd99858797df2f412340d1d

    SHA256

    52471c9dd028be4c0770943948586127e00a685ecb128a38616031d253f88c52

    SHA512

    01c2779ef47e40dcded29002f3588bb842dbe0314bcbbbd1550a2e375853b4affe7305a6ac5ca208f73af3053650dd242da99a2d347189d430b23d41ee87b464

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\FLEKQR5T.txt

    Filesize

    603B

    MD5

    eda881727cac1ed631d9aa6a776a45f3

    SHA1

    c380cb113ca5f4e5565a7091f2173a74e5d33880

    SHA256

    0c36d3af1f4869bd79858dcab9b6f97ffbee153172708fe4b00e748d1592ae28

    SHA512

    e5abc4f05cb6bb617ee1428cde824a9d220fc4265db127c354dc16176ab9958ad932ccc4b65cf67a264920ff7fbb37b8e63c1f86c7a47cb7d360e7b2b92ccdf0