Analysis

  • max time kernel
    90s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    26/10/2022, 09:58

General

  • Target

    http://URL:https://t5hmx.app.link/OKyEm5iPmub

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http://URL:https://t5hmx.app.link/OKyEm5iPmub
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1972
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1972 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1212

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\TU6OD0VD.txt

    Filesize

    597B

    MD5

    e4de003d26634c4bf624cb77febfd50c

    SHA1

    9b345f2f58c5dac71cf91270c3aa70cb5c6c9b08

    SHA256

    8bd267f9fbdbceba9a3a1600ad3628b0f7a8ad7be6068097d0a63f1f7092c5c9

    SHA512

    61e66d21700f8e0f9eb34689bcab50b0f4823b9575190ba2ffc4546b73e1a1b0eb88770b00a29ae3c8c9789f073f290bb522b2e19a2c5f16169b44b54cb032cc