Analysis

  • max time kernel
    127s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    05-10-2022 11:15

General

  • Target

    https://github.com/PythonWell/NFT-Generator-by-PythonWell/blob/main/install.bat

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://github.com/PythonWell/NFT-Generator-by-PythonWell/blob/main/install.bat
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1900
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1900 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1444

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    340B

    MD5

    eb4913a97f636f4cd59156cb3232f58f

    SHA1

    8d7614fd006da6e83b32ab71158f8395217a9295

    SHA256

    a33214fe4689a559a370a408b27e265a9fe585edebe1a9cf6fb2e42b9ac814a6

    SHA512

    03f693a6a38bebfbfb56fe3eeb23af5ea084f31f14954140a647a77b2ec1e3dedbdd6172a4ff4be5c5292a49e5d5a4b60d875f2092b968979ac7b13f865b619e

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\tcz8fqz\imagestore.dat

    Filesize

    5KB

    MD5

    e248c8856d2de5d7bcdea3be28a40523

    SHA1

    24dfd69e8f5c4a3a386e6747837aec09079959d8

    SHA256

    2568e6485fa82c1c62d6654c4a5a53e16e9f1f5271c735f0c0a6d8e74cc324e0

    SHA512

    fe74149c4f9bd1f092436757bd87d85cfb84007d289ea3e0dce31fffb48f4123746b80ed9e6e837a787ddf4c98e2f8f7a5b813415dbddb79c30056da302dae45

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\084DLGZ8.txt

    Filesize

    608B

    MD5

    8c8e9467a0f0e0133683eca4542acc23

    SHA1

    41534fb0bbde7d4ff01b57599e9d0da5d98149cc

    SHA256

    23694677497fa1421d18087413fbaba1d91657b241832b9199e2dbdd1bae06e0

    SHA512

    136fa54de4493119369e65dd7d04cd2f3466e7aec091504b44a7a9c69eee0185517c9645d753e66924a372b280ad58cdde450e73c46e8a7f71393a0476ba3678