Analysis

  • max time kernel
    150s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    05/10/2022, 16:20

General

  • Target

    https://pay.collectius.com/pr/ph/0ea16e89-6140-ed11-bba3-0022485957ba

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 50 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 9 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://pay.collectius.com/pr/ph/0ea16e89-6140-ed11-bba3-0022485957ba
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1336
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1336 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1868

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

          Filesize

          60KB

          MD5

          d15aaa7c9be910a9898260767e2490e1

          SHA1

          2090c53f8d9fc3fbdbafd3a1e4dc25520eb74388

          SHA256

          f8ebaaf487cba0c81a17c8cd680bdd2dd8e90d2114ecc54844cffc0cc647848e

          SHA512

          7e1c1a683914b961b5cc2fe5e4ae288b60bab43bfaa21ce4972772aa0589615c19f57e672e1d93e50a7ed7b76fbd2f1b421089dcaed277120b93f8e91b18af94

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          8266399c0cd9e8786c7bae976f2bdc35

          SHA1

          3975fe25d479661237cc1ae1e2f23baf72fe9cbc

          SHA256

          47bc0abaa9c9d2daec3edaaac1396772cad3b02d6a0bce6612209bc942becc8c

          SHA512

          d7e5482890be737467d971522e2c415aac7c8e9370966d66b23a9beb349ae0df278c434742359859c81603f5a7b9aefe1cf2a5ca410fe161a8ebbbe77d2fe57b

        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\lwrmjt1\imagestore.dat

          Filesize

          104KB

          MD5

          34194624a0a2b1db297ac773578657d0

          SHA1

          244aed2bb21cb25acc18927cb4328c55ad6fd37a

          SHA256

          b9a60154b838af86fd3218e24f27f4c7882bc90b6b2ab20b82e87cc840488e3b

          SHA512

          7c3970b142abd3e2629962c1d4d86cd580b2cf94d2115e7de066e40c3b48a5a1dfa99d2b95322c2254f45d3c7d0d58bf13dcea31272bd4e5852fa88d3834b835

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\NQQ54ZN7.txt

          Filesize

          607B

          MD5

          8ea80bd056ff34d743e3addab238f8b2

          SHA1

          68ad0dff5cdb80e26c5780d2d3a5ba65b311e9e0

          SHA256

          d50af745241334bafa85b8d088e3c23ef2d7ea154e951dccf9dc372aef3bac2c

          SHA512

          d618d8c18d3d040e7a164ee37a7c861c6cba15cfbd41e18bea223ea3e4ad1ff7b0bd4e0be751cb93cb7303548d8cebfef8a4cb0c4821da8ffb2b0fe3be36cb59