Analysis

  • max time kernel
    143s
  • max time network
    156s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    01/11/2022, 05:29

General

  • Target

    https://www.browserling.com/browse/win7/chrome105/https://tiny.cc/id2115879~

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 9 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://www.browserling.com/browse/win7/chrome105/https://tiny.cc/id2115879~
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:780
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:780 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:1520
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x464
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:968

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    61KB

    MD5

    3dcf580a93972319e82cafbc047d34d5

    SHA1

    8528d2a1363e5de77dc3b1142850e51ead0f4b6b

    SHA256

    40810e31f1b69075c727e6d557f9614d5880112895ff6f4df1767e87ae5640d1

    SHA512

    98384be7218340f95dae88d1cb865f23a0b4e12855beb6e74a3752274c9b4c601e493864db777bca677a370d0a9dbffd68d94898a82014537f3a801cce839c42

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ac250493cf7b985eabb28c1b0dee7a22

    SHA1

    b03877bb02e06c4a8faa1822eb1f4d4cd47cd0b7

    SHA256

    78f7d2bdcbfefd71f661c96ab8ce641e72ec72ba42a0f62e617a22422a39a138

    SHA512

    0c2163b53ccf8f5299c32a684664bef1806e3127fe32224c8b9bcdb93c6f0f4c5aa25714c91ecd4998f750432679f2781471f0d98ed6b33184e6848a1b9a2816

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\lwrmjt1\imagestore.dat

    Filesize

    21KB

    MD5

    f04e6f1721443bfaf78ed4f4ec500d1c

    SHA1

    9d7a9b93292cd057e9d6116b9aa4ef341c7e9845

    SHA256

    a62714d5d5631ca90ff1f6df9d11abc193b1f3aaeb5c0295cf7467b482bdbfd5

    SHA512

    a4c2f65e62d90628e1b5e98653c87e9943afa9958e10c52e6972bd85144e11482ba3c90bf6b4694e0fdb7a655c261ef1a115f681460fbfe1dfdc0ff3414f4a4f

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\BFM3RFG2.txt

    Filesize

    603B

    MD5

    1936e586edb085b259e536ef0bed586d

    SHA1

    293df7d2162c1054b21a7ea970126827b84ca4fe

    SHA256

    326ad544f1ca0da437cb37b5d7b6f9ff723ccd416712dff8fbe5e05b91919e01

    SHA512

    1ab0122ce2c626ae72291f0e7c22e54b2b5f4b52b2efed379a66b8393f983210a38951152803759a39ea455bc428dc4c0f5bbf3937cda8deca6d9928b4fa0301