Resubmissions

06-10-2022 11:58

221006-n5ltfshecj 10

06-10-2022 11:36

221006-nqmgfahca6 10

Analysis

  • max time kernel
    66s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    06-10-2022 11:36

General

  • Target

    https://associationdatabase.com/aws/OHLA/ctrb/195138/40737/2845726?c=https://ipfs.io/ipfs/QmdJLQ1h9NKYSgtTaitytXvYUNTtQwNhpgjCQGf4eo635B?filename=xzy.html#b2ZmaWNlQGJiaC5zaw==

Score
10/10

Malware Config

Signatures

  • Detected phishing page
  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://associationdatabase.com/aws/OHLA/ctrb/195138/40737/2845726?c=https://ipfs.io/ipfs/QmdJLQ1h9NKYSgtTaitytXvYUNTtQwNhpgjCQGf4eo635B?filename=xzy.html#b2ZmaWNlQGJiaC5zaw==
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1204
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1204 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:332

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    60KB

    MD5

    d15aaa7c9be910a9898260767e2490e1

    SHA1

    2090c53f8d9fc3fbdbafd3a1e4dc25520eb74388

    SHA256

    f8ebaaf487cba0c81a17c8cd680bdd2dd8e90d2114ecc54844cffc0cc647848e

    SHA512

    7e1c1a683914b961b5cc2fe5e4ae288b60bab43bfaa21ce4972772aa0589615c19f57e672e1d93e50a7ed7b76fbd2f1b421089dcaed277120b93f8e91b18af94

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    01b1af78751d91c2717052b6189e5150

    SHA1

    47f75860ac72bd192eaf4d072b0eae1ea9a5a7e0

    SHA256

    ae104dbe2817222a855eb1a5f8cfca1cf3e3c9d1b69e20f7e7e2363fb74ed76e

    SHA512

    cae11be81c106e5da714995889be2d28ee146766ff34218701bf397e691872123edf8a7dbb1e3f4e85a65575fe1108d56be5e0650c518e3b752de61d347ac904

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\309axvf\imagestore.dat

    Filesize

    19KB

    MD5

    a0f4c52c17eb828aac4cf039f8fcb107

    SHA1

    b11fd94c6e614a5e76bad5f02b4353a81e92cd88

    SHA256

    428cd91a511a83b524aa911b17ec0e166dd09db00604a1f81f3a8b4c043cf606

    SHA512

    2144c6882e02b87464c938ea408cec57b4754c0848fb783a7259f614ca0834ff34ebbd6b6da774683065d2488ae8354fd3fed6bcecb628205752cbbfa0e919dd

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\IAGNJJ49.txt

    Filesize

    603B

    MD5

    9fca5a31b67caa1e5fd88483299ede6d

    SHA1

    6a83cc233548c7b3bfc3356a8f025405af82f12f

    SHA256

    3e11ac36f15c731b70df7ac4995153af6d825d35b7db2f312662fc6e76ab0344

    SHA512

    111953f1770d9f47ed90eddcbe732412cbc6446bf6535f048804278c0aab0d389e11672ee31755dc104fe3fe75b75455dc0f569470bc891478e897bace284dc5