Analysis

  • max time kernel
    67s
  • max time network
    136s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    28-10-2022 16:35

General

  • Target

    https://uc72ef757a14e26a6d8721a6589f.dl.dropboxusercontent.com/cd/0/get/Bvr__eKDcE-WvmRQw-ZlhPeA3lzXHPWQPAVKYrfpwoUvTcRrkEnK1_8eaM3Lv19fkNhhY-CPt7eLvtlu2rHIcqRGJ_DNZPPYTEEp3a3Yf-6B6gy8-O1Oiis3IH_7F28u9fMU02bJYyCMtn3cUTEWEW0HmBJnQXjT4vDZBL_Pj3xAFNNfHjR_ijb_gHf8wqlj30E/file?dl=1#

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 48 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://uc72ef757a14e26a6d8721a6589f.dl.dropboxusercontent.com/cd/0/get/Bvr__eKDcE-WvmRQw-ZlhPeA3lzXHPWQPAVKYrfpwoUvTcRrkEnK1_8eaM3Lv19fkNhhY-CPt7eLvtlu2rHIcqRGJ_DNZPPYTEEp3a3Yf-6B6gy8-O1Oiis3IH_7F28u9fMU02bJYyCMtn3cUTEWEW0HmBJnQXjT4vDZBL_Pj3xAFNNfHjR_ijb_gHf8wqlj30E/file?dl=1#
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1600
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1600 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:588

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a8b821c090cb7b28252cfb5cfda17c23

    SHA1

    d576ea90de8acab4da302cd59e4dd8464bb72f8d

    SHA256

    ef6a6ff44c57d45bbc3bbfe1c132fb456dfdbb560dd23724d8b69664add6d372

    SHA512

    2252802ce54331feb8c09ba8f50cb6f9262e3380cd4312a49e9e6aea49c15fc13c00c71dbcde6946dca74ada039c7288406a90c7a848d3128d8a30359bbc6f4d

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\FJVC63PY.txt

    Filesize

    603B

    MD5

    13587523ac6e50241f93b77df36036c6

    SHA1

    dafe6f4eed1cdfb3ae420ac9751e9f71ad263f3f

    SHA256

    aeb70369dfe2a987c85b4161bd9c552696cfca3561c4e30b51c1dc2ad86eadfd

    SHA512

    4477b76e1c0f41670300ed7a2c7c4cfeadc7929f65103a44a93ef621a635c0f7a83dc3d2c411297e0769c982f2b4f297a3872854ee891c11039fc271751d1167