Resubmissions

28-10-2022 18:50

221028-xgwhesbebq 8

28-10-2022 18:17

221028-wxaefshhd3 6

Analysis

  • max time kernel
    256s
  • max time network
    296s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-10-2022 18:17

General

  • Target

    https://urlp.io/u/5Ox

Score
6/10

Malware Config

Signatures

  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Modifies Internet Explorer settings 1 TTPs 46 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://urlp.io/u/5Ox
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4960
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4960 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:4716

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    4f630c01f9bf4c57d049a46ea616203c

    SHA1

    a2d06f097a95d9096f7e381d39e982c0c29aac25

    SHA256

    217bc1b6fd8b9b5987d428f164bde885ce60d24db297abd86c177e8595c30793

    SHA512

    1ae68ac255fe9b2c517425e8642fb630c178ea261e6e844fc27d7a9f8d3e6c92da594549284622aee09b96540e9fc6086fa32ba7f66c794c1c983ed7c526af45

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    434B

    MD5

    178f3e914b6a8d0dd3c4650d9a050159

    SHA1

    7504d05c2842af82a7f005c66882c88781934b5a

    SHA256

    275e793e62048d0f48d02879be83466f3d15fc6dfe1a939f4b53427f905f09f1

    SHA512

    9918f36429f5a1a797369c220a1262e343fb44645c3f6d64d5a0929553092bb5264e3d0932f281733088dd17a7e1d17546b1dc0e25cdaae965b9bfab077ca2b9

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\ckj4gk4\imagestore.dat

    Filesize

    73KB

    MD5

    0493f8daac9b7dbafe7beed241f3a7c1

    SHA1

    53946c8bffffa7a952bce2f03b607b780fcca76d

    SHA256

    bcfcca673e6175b3f63cc210aba1b4fdf049a054a219c0d26d066cb2f54354e6

    SHA512

    dc73164de3128ce5d52b6335e3d2e227db417aa3ca7f08b2b20b90aa65d2e2ba18a4528b053a80c1fab078a516742ea76097288ae10fb0923539fad3750b0c2f