Analysis

  • max time kernel
    395s
  • max time network
    414s
  • platform
    windows7_x64
  • resource
    win7-20220901-es
  • resource tags

    arch:x64arch:x86image:win7-20220901-eslocale:es-esos:windows7-x64systemwindows
  • submitted
    11/10/2022, 20:49

General

  • Target

    https://drive.google.com/uc?9930213743?export=download&id=1OPnOW3quflevCGG2_8CEHYd1YxbTEv2W

Score
6/10

Malware Config

Signatures

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://drive.google.com/uc?9930213743?export=download&id=1OPnOW3quflevCGG2_8CEHYd1YxbTEv2W
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:952
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:952 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1536

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    01a315c1eb529e076a817b89253ff1ed

    SHA1

    d0c54cd6bc79677a3d11d7cedc5897f62cd56a60

    SHA256

    202673ef6b42b23e66b3a21cfba71570d7c44cc7de1a0eb67eb064576b12d329

    SHA512

    901ba2b5192f2ad91e438e5b18a47b5c8ef8340514ba5b3354eea75b589f1e60bf67a02068f85278fcf34aea63fb17ca4ece4011775e4fd8cb5e20aee6f46ff8

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\309axvf\imagestore.dat

    Filesize

    5KB

    MD5

    77242990c88031c99a8ff32e6dd04baf

    SHA1

    be706c8a7287d770f2d04ce85d57ef75d268cabd

    SHA256

    ab23c193d512a4ee1b20d30ee6b98a9b1aee73a65fd903dfdc81c064259193d6

    SHA512

    7f7364a13f06a84a1992000c85eece59ae2846af3733cc2acff476d4b638e505955676c0334bdc9589328405132c1cfe801b795d90ab77c65498aec717a00a8a

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\8AK00PBG.txt

    Filesize

    603B

    MD5

    5c39716b063b76160b7f3cc4066d8dd3

    SHA1

    92a934f050b4ee768de86f9bd8ac492c2aea427d

    SHA256

    b72683e9b2d6245df0fb85adb83a978fda0161d94a3edde09efc947566ac4110

    SHA512

    450ce0af498c9554bd826fc97d5835217a6cbffd0a3d3a06796a1d8b7b661a0e1e43beb498e065f06d07f610b2be0bdb24e06a434918c536cd7cdfc2434e6594