Analysis

  • max time kernel
    81s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    18/10/2022, 00:32

General

  • Target

    http://mygov-onlineservices.com/spipi/power

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http://mygov-onlineservices.com/spipi/power
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1516
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1516 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1612

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          340B

          MD5

          d43ce09b99f0dfd517e73cd28ce6c538

          SHA1

          09ec31a7539056b8a752fe6ce17e8c7eec69ba89

          SHA256

          e7c118a8b90b81e22aabf70be3c6ac804dd6a3e17c05435e9e1940bf12fe1686

          SHA512

          ec610f71c86734879b25232ba6ab97bbdd6a5c0ca9fc25ab2bbdbbbf37fa8871218bb55bc7c15c685a36a120f86e3b7d3e31115f867a7e3b5edfa69920b01be5

        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\1evexod\imagestore.dat

          Filesize

          21KB

          MD5

          834f3542b2b05211f147a4cd146ece56

          SHA1

          365546abedd281ff10f15b94ebfc7b39042df28f

          SHA256

          4dd02a9034a2489de299960b024ecbcd96cd91780984aeb0c90d80552fdc7412

          SHA512

          9587c5d41563f8b0753c0cf0580fee63830ce0e160925ede0b08078dd9cb49296c9866ed1ba72404b38623b805e8dc10a1ba0b368a50a310575c530eda125750

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\EKMJEPEX.txt

          Filesize

          601B

          MD5

          7c499f2bc1d47bbc6d9c30049286cd74

          SHA1

          d3af7e8b3dd37a54547451d32c5d2bc32f0be95d

          SHA256

          e6529080e5f5514ec5828668d9abe7ac54ca71cf118c2cfcb9048cb261174d8e

          SHA512

          1034749b67d3d509afe45d10f6881b5836ba58f7880a67ed7f5dcc78664238be68ab58abff6e197561bfc3219c1cbd425252bca93bbce74f2d43d58e36fbfd61