Analysis

  • max time kernel
    406s
  • max time network
    410s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    21-11-2022 16:02

General

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://wakasapp-stores00-webauths-ospiz.ondigitalocean.app/#[email protected]
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1396
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1396 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1324

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\82CB34DD3343FE727DF8890D352E0D8F

    Filesize

    7KB

    MD5

    f739b394d30d392d8eb28922bf5a7e12

    SHA1

    78124ad341a0e03ecbb7660011409767e6678fef

    SHA256

    4fff638b8a8f8004eb7a6f5d71ba702373ece50bbe85f499d00d09e7c86dc543

    SHA512

    48cf40407485d1a22f728220a64dc15e85cf051a44104019efa868cc7fccdefcfea2169eea8fb72be819a8c67892aeee72fd22deca31b8bfbd3f8018e55e215f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\82CB34DD3343FE727DF8890D352E0D8F

    Filesize

    232B

    MD5

    9d6f9bf1d8e1b29be1a1d8650bb3f855

    SHA1

    399b7e4636d98de974e478cf15cfa5c93770c0a0

    SHA256

    e434d4280e060a8a0f958bb399eb35858c6d29f3e425e2c87ba60e6399c6413e

    SHA512

    cc86d34638412aee3747d96bb63dfb5727d00180568b153dcdd0dae78d2049a38891f4cc63394f145a73e61d900cfd15d930ca0da61982a37ab213d43baade95

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9a2ec1d93c42160b3a5a638a91a9fe27

    SHA1

    19c2393b3e01a60141a29fd7e5033c805eadd75e

    SHA256

    f043576fa5fa96a172c041839928232a8e812a3eef82e97a9e8a8c9a89437676

    SHA512

    6103d591f719377488825ea19ecc355098b39457bac97efa56fefd34f4d0cce9e916998811a022e4a782b7eed8c6ed37d4240e967d740801fd67b11d4df4c610

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\C1RFW9YR.txt

    Filesize

    601B

    MD5

    f83fdf0a8003d37cce56b942e4c43177

    SHA1

    694a1d422dbdd32185262a239ec772476ca79825

    SHA256

    d689a6ade1b05ee301b0169363afd96c13ba6edb7458342a5e9d1db123c6ec3d

    SHA512

    02ccf47135c9558da578dd89dcdb66846f6f179830ad7cb9e9bc4c62b82bdf5ca7a571e6552399e04999552af387f25b6e82a364e72cfd4c4f5d7b2da8e75404