Analysis

  • max time kernel
    81s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    03-10-2022 06:29

General

  • Target

    https://clt1488991.bmetrack.com/c/l?u=E666C4E&e=150DF82&c=16B85F&t=1&l=8DABE5D7&email=nJRsej4QjsOjaaV61Fx5VC1oDpgEbfiZ&seq=1#dmFuY291dmVyQG1hZS5ybw==

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://clt1488991.bmetrack.com/c/l?u=E666C4E&e=150DF82&c=16B85F&t=1&l=8DABE5D7&email=nJRsej4QjsOjaaV61Fx5VC1oDpgEbfiZ&seq=1#dmFuY291dmVyQG1hZS5ybw==
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1184
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1184 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:944

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
    Filesize

    60KB

    MD5

    d15aaa7c9be910a9898260767e2490e1

    SHA1

    2090c53f8d9fc3fbdbafd3a1e4dc25520eb74388

    SHA256

    f8ebaaf487cba0c81a17c8cd680bdd2dd8e90d2114ecc54844cffc0cc647848e

    SHA512

    7e1c1a683914b961b5cc2fe5e4ae288b60bab43bfaa21ce4972772aa0589615c19f57e672e1d93e50a7ed7b76fbd2f1b421089dcaed277120b93f8e91b18af94

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    e8de574ba473c6ee22252d4b2df458fc

    SHA1

    a0bdeaf238417e4b82c5f4a68ab6375c0eca2ee6

    SHA256

    531f2194f7298c83f529ae6efab501f3e300c1989acccd827c887691b4f57447

    SHA512

    60dd46f7507a74f7cd5fb73fa56af66b06f48aa18dd6645f26b01edaef2857155c3454fd2c6aae4e20c1d7e5fb8fbc64026f0a07b2c307829ee2df32a7277efd

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\L9Q2BC0C.txt
    Filesize

    606B

    MD5

    c377ba21ca3af424cfb084fc5246d1cd

    SHA1

    b667f7862e8748c8d6c9c17faa2d7b271a6b97ae

    SHA256

    d41e635a5e4eb3305fd719fc778e0184c9e27e3047b069f6a13dd1a2adc8f292

    SHA512

    c51086e093bed1b933100da1c801bd4ce3439d8012a691da35412dd3eb457082110b8e2665742164d83ad3861ccf7daec25c1801e2d80080bce58c2c1c380a1f