Analysis

  • max time kernel
    67s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    17-11-2022 12:28

General

  • Target

    https://tangible-fixed-tuba.glitch.me/moght.htm

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://tangible-fixed-tuba.glitch.me/moght.htm
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2044
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2044 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1544

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
    Filesize

    61KB

    MD5

    3dcf580a93972319e82cafbc047d34d5

    SHA1

    8528d2a1363e5de77dc3b1142850e51ead0f4b6b

    SHA256

    40810e31f1b69075c727e6d557f9614d5880112895ff6f4df1767e87ae5640d1

    SHA512

    98384be7218340f95dae88d1cb865f23a0b4e12855beb6e74a3752274c9b4c601e493864db777bca677a370d0a9dbffd68d94898a82014537f3a801cce839c42

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    7d0b83d8c95590fe7a0225b7efaf9ed3

    SHA1

    def7bc921e57e5244dea3be5d2a8dd5d3860cbd3

    SHA256

    62f13c9faee4099da6e33a4ae21435899dc1d351556b6874418049fefe61ff41

    SHA512

    d96676bd42d99bd815978275e410572df0bdaec8c13bef2dae598b4654971b62077258d8bdd70dd2e7d749227bbe2469bf3ed5440cd1b4ff34f6681d9df87959

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\4WLOGHJP.txt
    Filesize

    606B

    MD5

    2d8611dd05762f1d70c82ad91a90ad37

    SHA1

    642614ad4363ff54185d760e0342cfceb400e18b

    SHA256

    4d903d650e457b29691e84c972ba8a28fd088455ff51f1beed5ed0a345caec9a

    SHA512

    a93dbaa46c851bd9724457a901658a8db6426d914bf275753c415c68d03a424ef703522b22f3a5e306027e9fe2bc659b65e5ddbcb896c7f9bfa308644ffb4aed