Analysis

  • max time kernel
    106s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    29/10/2022, 20:55

General

  • Target

    http://mofa.go.kr

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http://mofa.go.kr
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1600
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1600 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:588

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

          Filesize

          61KB

          MD5

          3dcf580a93972319e82cafbc047d34d5

          SHA1

          8528d2a1363e5de77dc3b1142850e51ead0f4b6b

          SHA256

          40810e31f1b69075c727e6d557f9614d5880112895ff6f4df1767e87ae5640d1

          SHA512

          98384be7218340f95dae88d1cb865f23a0b4e12855beb6e74a3752274c9b4c601e493864db777bca677a370d0a9dbffd68d94898a82014537f3a801cce839c42

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          783d75ad94f350273e28cac98100c51a

          SHA1

          6cf1fce57e58088084bd1289db916438c90fa0c0

          SHA256

          2552eea97a718be417044bad2a2ce4cda5da7018eeb1514136162dc886ab7fad

          SHA512

          3c6251a8857ab1667ad8beb907796cc63dd55d6d363c2637d1a96bb6822541d23b360c4aab6427f9536c13c544ab446d6445e483537ab24f553687dbdee3063a

        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\309axvf\imagestore.dat

          Filesize

          38KB

          MD5

          fa031642a5ac5d8972f8dfb81050d385

          SHA1

          2b7a87f23a1ecf927f6f6fc464ca4beb33263617

          SHA256

          f15de26ea117fa5f91029afa3a2feb5f83b8ef9fcf468094f76898e79ae77c92

          SHA512

          cc603f7c7e20c6ce333916a95c16d2551b8be4db777c28f566c6a146505ea6f6e3452cd8c6947ab19e530f1e8a2c900805ff1338827f667c9c42214c1f200d8f

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\WCILR7MJ.txt

          Filesize

          603B

          MD5

          e79c1878e543feee54b1ef643de20de6

          SHA1

          1d45cbf9229d55172ad33d98f62d85376fd92720

          SHA256

          dfdeadee5f74f095b64c0d57c40082bcb05cd2b1435b3fe1f34e10ab13c50534

          SHA512

          fe1672b86a3548060df945b22494282ef835ae41c33455920439715861c71561d9c52f2e17faff4cbf19a6487ac751641e0b2b8b9179bd0667aefeb37bc7708b