Analysis

  • max time kernel
    81s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    03-10-2022 06:29

General

  • Target

    https://clt1488991.bmetrack.com/c/l?u=E666C4E&e=150DF82&c=16B85F&t=1&l=8DABE5D7&email=nJRsej4QjsOjaaV61Fx5VC1oDpgEbfiZ&seq=1#dmFuY291dmVyQG1hZS5ybw==

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings ⋅ 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow ⋅ 1 IoCs
  • Suspicious use of SetWindowsHookEx ⋅ 6 IoCs
  • Suspicious use of WriteProcessMemory ⋅ 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://clt1488991.bmetrack.com/c/l?u=E666C4E&e=150DF82&c=16B85F&t=1&l=8DABE5D7&email=nJRsej4QjsOjaaV61Fx5VC1oDpgEbfiZ&seq=1#dmFuY291dmVyQG1hZS5ybw==
    Modifies Internet Explorer settings
    Suspicious use of FindShellTrayWindow
    Suspicious use of SetWindowsHookEx
    Suspicious use of WriteProcessMemory
    PID:1184
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1184 CREDAT:275457 /prefetch:2
      Modifies Internet Explorer settings
      Suspicious use of SetWindowsHookEx
      PID:944

Network

MITRE ATT&CK Matrix

Collection

    Command and Control

      Credential Access

        Defense Evasion

        Discovery

          Execution

            Exfiltration

              Impact

                Initial Access

                  Lateral Movement

                    Persistence

                      Privilege Escalation

                        Replay Monitor

                        00:00 00:00

                        Downloads

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
                          MD5

                          d15aaa7c9be910a9898260767e2490e1

                          SHA1

                          2090c53f8d9fc3fbdbafd3a1e4dc25520eb74388

                          SHA256

                          f8ebaaf487cba0c81a17c8cd680bdd2dd8e90d2114ecc54844cffc0cc647848e

                          SHA512

                          7e1c1a683914b961b5cc2fe5e4ae288b60bab43bfaa21ce4972772aa0589615c19f57e672e1d93e50a7ed7b76fbd2f1b421089dcaed277120b93f8e91b18af94

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                          MD5

                          e8de574ba473c6ee22252d4b2df458fc

                          SHA1

                          a0bdeaf238417e4b82c5f4a68ab6375c0eca2ee6

                          SHA256

                          531f2194f7298c83f529ae6efab501f3e300c1989acccd827c887691b4f57447

                          SHA512

                          60dd46f7507a74f7cd5fb73fa56af66b06f48aa18dd6645f26b01edaef2857155c3454fd2c6aae4e20c1d7e5fb8fbc64026f0a07b2c307829ee2df32a7277efd

                        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\L9Q2BC0C.txt
                          MD5

                          c377ba21ca3af424cfb084fc5246d1cd

                          SHA1

                          b667f7862e8748c8d6c9c17faa2d7b271a6b97ae

                          SHA256

                          d41e635a5e4eb3305fd719fc778e0184c9e27e3047b069f6a13dd1a2adc8f292

                          SHA512

                          c51086e093bed1b933100da1c801bd4ce3439d8012a691da35412dd3eb457082110b8e2665742164d83ad3861ccf7daec25c1801e2d80080bce58c2c1c380a1f