Analysis

  • max time kernel
    148s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    17/10/2022, 14:48

General

  • Target

    https://bit.ly/3CQlR6K

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://bit.ly/3CQlR6K
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1048
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1048 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1764

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    60KB

    MD5

    d15aaa7c9be910a9898260767e2490e1

    SHA1

    2090c53f8d9fc3fbdbafd3a1e4dc25520eb74388

    SHA256

    f8ebaaf487cba0c81a17c8cd680bdd2dd8e90d2114ecc54844cffc0cc647848e

    SHA512

    7e1c1a683914b961b5cc2fe5e4ae288b60bab43bfaa21ce4972772aa0589615c19f57e672e1d93e50a7ed7b76fbd2f1b421089dcaed277120b93f8e91b18af94

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    87d542b31cec400974c537b0bfd641fb

    SHA1

    a4cd98fa392fa37e33f560f2f4ca16633b29e47d

    SHA256

    8f38b5bdd06e47ad09c6b5740847d5798df16c0a2652677045c2ddedfb59a0b0

    SHA512

    c9ed724f07982038d5720305571169df986d77394f0831c0f345dbaade2d17d0a5ba418f3e6804ffee8f53489f892dccecfbc51cf36207a5d33ad477dec081ab

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\IWVZYUI6.txt

    Filesize

    608B

    MD5

    a92f8d81287fbeb4aa75acaf693f94ff

    SHA1

    00c3260f20d641f03c74d95e54acd05a36eb8407

    SHA256

    9bb9561d186532cccae7426a0080db12964f2ab17742d399fb075474b6509638

    SHA512

    e2f84c007feb6c69926f8685aff4d13ef38bea7a59b6f9f238eac25f897c916149cfd64c8a178a4ddbfca200a6992e46b0cd8b81c016e905e4dbe4664cc3c6ca