Analysis

  • max time kernel
    124s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    03/10/2022, 14:24

General

  • Target

    http://smrtr.io/bGpKQ

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 59 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http://smrtr.io/bGpKQ
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:576
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:576 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1092

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    60KB

    MD5

    d15aaa7c9be910a9898260767e2490e1

    SHA1

    2090c53f8d9fc3fbdbafd3a1e4dc25520eb74388

    SHA256

    f8ebaaf487cba0c81a17c8cd680bdd2dd8e90d2114ecc54844cffc0cc647848e

    SHA512

    7e1c1a683914b961b5cc2fe5e4ae288b60bab43bfaa21ce4972772aa0589615c19f57e672e1d93e50a7ed7b76fbd2f1b421089dcaed277120b93f8e91b18af94

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cf4269704822c92612600903fbfa9d99

    SHA1

    e8bb0e61c3c038f2b471eddfb302de52bbbe07a9

    SHA256

    47495f2028fe638b1bb80e62916f8f5f82f2909ef6e4298ca6eef52e39aa4126

    SHA512

    461e18ab96d1961ded6eb939811468a7ed0ec8a0818c4904ee10a0c3283f5d6ae9b184db3ab20460bbbc78d396d585e2d3c378a613c6a91080328afcd59b838b

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\1evexod\imagestore.dat

    Filesize

    4KB

    MD5

    1948ef0a0bb50c290c17d8aace1d2ba1

    SHA1

    b8a60a8e7b3f667716431be742e1b708647ca5e7

    SHA256

    e5be8c5e63bf254f06cc347e06cb77d323db331763beb2d318fc7a5205fa4f5a

    SHA512

    e5db5984c8edd18702c2b5d445fc89889bad405ca3fda94c93554d63cea7c54304d684d59b4e86077e25fb13c6499cbd9c4d8039435ead66b05a49db4e19808d

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\XQP5XMU6.txt

    Filesize

    606B

    MD5

    8377c04d4e51fd0848b21b3bda2f434a

    SHA1

    50e29c8b35b4a277cc488fe3b8b7ee9eaf8f231c

    SHA256

    071f712fc41ab159134525f970b1112f1e6a9f18eefc3e5cb32e030089c31167

    SHA512

    d318369cf59c7ea5979dde723d26805d48607078720f52beb44c66bc916b39946966a120f05b0c7e986c6c00b27aed92bb2273966e13e03a644751a400bd1927