Analysis

  • max time kernel
    144s
  • max time network
    223s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    16/10/2022, 10:59

General

  • Target

    http:///home/nuk/Desktop/Emulator/src/additionalpayload/8ad4f5ef32dbe6015a2be59ef38a9f2672bba334534afce88cd64fcdeac2ef1c

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 47 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http:///home/nuk/Desktop/Emulator/src/additionalpayload/8ad4f5ef32dbe6015a2be59ef38a9f2672bba334534afce88cd64fcdeac2ef1c
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2684
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2684 CREDAT:82945 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:3772

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

          Filesize

          471B

          MD5

          a1fa0003a52ebb324daef7beffac914a

          SHA1

          05a4f39bebde05937dfefcddb4eaf3c6934a3216

          SHA256

          00fd170b5c3ca6ff33acc4ca1ae96f14000aca8692f038d639793eeb4881cfb2

          SHA512

          470ba58cf873bb1b0e34c7f8f7f73a80c842807e5d1bb2520fbe2dbf6f5bde0f7c911af9c4c062be16c128e2a24bcc4bf81244f5ec7fbfc4287a30136848536f

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

          Filesize

          434B

          MD5

          dbdd35618258cd7e1915068851ea9a4b

          SHA1

          ddaa76dd606ebbcaa744a673f57d853bdfbcbdb5

          SHA256

          c82347a6d26f30878157c9aadbfd25f064aebf7de78550d2b85162553536475b

          SHA512

          9c70f67b824c7bba96d6753c2b375041ee96647222e3a4dc74897f1460d0f3c30bb977430a1641742d5ddbe2ee09ced62398355c13b5f2405997a55e3d0a8292

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\BA49GWU8.cookie

          Filesize

          611B

          MD5

          487d8524703be521f1f4c777e882d6c8

          SHA1

          c24463f29cf97f8430d2f748795b5a1148473ffc

          SHA256

          5c2f23b4421ffb1f489bda44871e2b1070a1de11fc97fab1eb9e4ad7f8ed771f

          SHA512

          e72806bc00723699cb8ea783956d27f139b904327bca992a94a5517b9bb2f2054ac321347f054f696798f0830179bdd980454c2f31034a509ef13a98315d0e5a

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\WVVSOYJX.cookie

          Filesize

          610B

          MD5

          ca0dbd29d5f6cab45a7621223603ed6a

          SHA1

          73b9a5a2e5acf1527a4e5c4be7064254812a522d

          SHA256

          f036228853b66a96aad2a3a0f079d20bd28500d4ce5c014b9c1e68323c46ec80

          SHA512

          222dedce54dc049cdd82707ada1851801852364ff00c0476e29d85a0bb5b1b92a75262ed3f56e06c1c9a3be77b7e956e3d406a951bfe046631fb1f35190eff13