Analysis

  • max time kernel
    97s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    04/11/2022, 11:54

General

  • Target

    http://scontent.fbud10-1.fna.fbcdn.net/v/t39.30808-1/312920727_5490630997641054_6350965549693391976_n.jpg?stp=c0.6.40.40a_cp0_dst-jpg_p40x40&_nc_cat=101&ccb=1-7&_nc_sid=7206a8&_nc_ohc=LA3F4ZuNylMAX-DuLvQ&_nc_ht=scontent.fbud10-1.fna&oh=00_AfB7cYU_sR3CKDQL6idtsmKm1atQpODhy-xDruHCluSNTg&oe=63699784

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 35 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http://scontent.fbud10-1.fna.fbcdn.net/v/t39.30808-1/312920727_5490630997641054_6350965549693391976_n.jpg?stp=c0.6.40.40a_cp0_dst-jpg_p40x40&_nc_cat=101&ccb=1-7&_nc_sid=7206a8&_nc_ohc=LA3F4ZuNylMAX-DuLvQ&_nc_ht=scontent.fbud10-1.fna&oh=00_AfB7cYU_sR3CKDQL6idtsmKm1atQpODhy-xDruHCluSNTg&oe=63699784
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1052
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1052 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1652

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\tcz8fqz\imagestore.dat

          Filesize

          5KB

          MD5

          c0194df92aa9c26d141f87f1a52756ad

          SHA1

          89fc8bff801830c87eca8f861d2977bd7f86d46f

          SHA256

          d15d16a7c4356269f11aa140b0800af6575edd8e4b65d421de95f1584944a228

          SHA512

          9c4aac69ced31959a9350f920edb561b485303d05783d2373f39599d67a83b7af5d32de5416c476d3ff6e30e3caab8e3d7576176688be749c857ac474dab76eb