Analysis

  • max time kernel
    149s
  • max time network
    163s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    04-10-2022 12:33

General

  • Target

    https://github.com/RuDeveloper/Pure-Miner-v4/blob/main/Pure%20Miner%20v4/project%E2%80%AEnls.scr

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://github.com/RuDeveloper/Pure-Miner-v4/blob/main/Pure%20Miner%20v4/project%E2%80%AEnls.scr
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1812
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1812 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1324

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    340B

    MD5

    735716d82f07df69507e7b8cbd24d5cf

    SHA1

    b1664fb695feb2b1f8bd600a30ac2027544dd5d1

    SHA256

    e8f84f6d15db58f3e36be72fe7b50fc267bc3b372dcea6fe0d3f00291a28d95a

    SHA512

    fc519f03ea6d5feee4ec15aaa898e5ed6ff70570e81fd48b718ea4bfb7ac847ed9d57ec10349c030982a6ebe0d600bf04708dc1e238872eff151ab6cb20a64d6

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\lwrmjt1\imagestore.dat

    Filesize

    5KB

    MD5

    53923f850b521f30d4fe13c78e33bf6a

    SHA1

    3aa71e28c6026bcbd89feb51de8f96a2298b0edf

    SHA256

    915116a75a01a3f558a02a6d8b6ebc586a173f76279f9841ba8b031486a61022

    SHA512

    3fa7f41a32166ab99ad3618b01551510a1f2781ed26cc6e25ba2db434743ebe1afc34bda0dec1b42a76723b3c3c6af318983fbdddb685a4d8585909d63504dc1

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\JP8T7QL0.txt

    Filesize

    608B

    MD5

    6cf01d62a6df0118a6dec039eb54ace5

    SHA1

    a1fa7f4d614185ea14b548ed13286be8d3384e9e

    SHA256

    3a968e9b6e137a786041fdb0c91ef4407b186821eac5d82f92721d79db6439c9

    SHA512

    3436898dd54ad12e887a173e84a055428e50f1c5cb377a26b9a5cf983b07e9ad137ae940dbb1330edd7f04e7a14e560a9c31875d2f8e10af7ae4f74375dd3052