Analysis

  • max time kernel
    137s
  • max time network
    224s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    27/10/2022, 12:17

General

  • Target

    https://dfmazhar.edu.eg/ldbe/rws

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 60 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://dfmazhar.edu.eg/ldbe/rws
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2772
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2772 CREDAT:82945 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:4716

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\DH5CCS1Q.cookie

    Filesize

    615B

    MD5

    d953314bf9f21ebd30a369248e2da84b

    SHA1

    5511cbe53870f715fafd29b81aef8cc13f80c9f5

    SHA256

    0418950fca0222677af064b7c0f12a21f1160ad7101f9889b8ab09a0f11fae2c

    SHA512

    72279f84059ae96bd816cb8f1acd11273806c57469889c6e598932992a2831480084e68196009249650d1c5ac2d5cbb5c931b0528b7cb5431137fd02431ac0ef

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\YPKIBEBO.cookie

    Filesize

    615B

    MD5

    8bcba4787bbbf73b5bd661f62d3ed85a

    SHA1

    c63b3c4dc9f57190f2e7126de28581ce0e73672e

    SHA256

    6d8fbff3b8e0531170c360caead89532352380f8b81b55a2d26c2ccb2d551d72

    SHA512

    a5c0bc8baf8bdcb721146b59302f8f046c7e9712e207581f17797bbd81fe5f07158b355bdfb2d0d4bded3046a5e2d783b6089ef691a32e2282e1b732404c8279