Analysis

  • max time kernel
    122s
  • max time network
    192s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    04/10/2022, 21:24

General

  • Target

    https://lthge-zcglf.campaign-view.com/ua/viewinbrowser?od=3z735b07acf9ddfbe69b4660294b02ea06e05241bb7fd085ad1330565e23380377&rd=1e03161021c6d901&sd=1e03161021c509c1&n=11699e4c1180f76&mrd=1e03161021c509af&m=1

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://lthge-zcglf.campaign-view.com/ua/viewinbrowser?od=3z735b07acf9ddfbe69b4660294b02ea06e05241bb7fd085ad1330565e23380377&rd=1e03161021c6d901&sd=1e03161021c509c1&n=11699e4c1180f76&mrd=1e03161021c509af&m=1
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1380
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1380 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:888

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    60KB

    MD5

    d15aaa7c9be910a9898260767e2490e1

    SHA1

    2090c53f8d9fc3fbdbafd3a1e4dc25520eb74388

    SHA256

    f8ebaaf487cba0c81a17c8cd680bdd2dd8e90d2114ecc54844cffc0cc647848e

    SHA512

    7e1c1a683914b961b5cc2fe5e4ae288b60bab43bfaa21ce4972772aa0589615c19f57e672e1d93e50a7ed7b76fbd2f1b421089dcaed277120b93f8e91b18af94

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    791ae8da879f3ce4729054e26ffef49f

    SHA1

    e8fa7c291d12f272460f1e1048ec248d073500c0

    SHA256

    4b6c4e58215bdb515a7cfebfa14bd5754e9253838f048a9cf253eec500b4688b

    SHA512

    6734ba6f724faad49d90e059569f6bf2c45dcd80faf8c471bb9613319cd2ba9ed40b6a3540ec4eb597786f7311860c3d60faa4917284dc652324498ca19aa25e

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\W6S272D5.txt

    Filesize

    608B

    MD5

    f74c2e7ce1fd9be8db6ece35a1af687b

    SHA1

    6a8179a34470c42656cb2f7c9b86c4a7fbd818cc

    SHA256

    f8b5b338dd7991b898075601d31b853f63823a8b419901ce8ab892d463424f42

    SHA512

    a2d2b647b20745fe7b2453f5d7c7c38b1c97c265a0af74161bea6b1891e45848c61498466b32b8ab1dcf683d48ee4abdb1c022b318107148c571b0011346da9d