Analysis

  • max time kernel
    67s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    21-11-2022 19:49

General

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://www.google.com/[email protected]
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1244
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1244 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1148

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    01540d2f275898cc5ca0ad9883776979

    SHA1

    019a25cbdb1c3b45935641246e11bca1a126a83c

    SHA256

    7f294737848df1b9c4246eba717af78304f8deb21b683e7b63d44b57696fc21f

    SHA512

    5a400448250de97be0d3f05f254c5ee017a9d822fa6bd68ae74b78d98d438da844cf48ad3b63182e2a1060ebe4ff7171d3e8d823b4cfb3e540456841cb7316e4

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\try74lz\imagestore.dat

    Filesize

    5KB

    MD5

    ee0e022abf1f20062e1fd9c1a5641289

    SHA1

    ffb13ce8a406ec136daf91289856c99ba6b6e64c

    SHA256

    43f3e3a8cbece3d75a84e1268c28e2114dc846c6884c7badd5de3e5aa6ff089d

    SHA512

    39358f840ab09a5596537a4e76854e805fd908ff42703b89df60a5951df6b4e8100581de99202e8e13e3e481a7a1987ea607c288bd02896e02cedada7935e21b

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\try74lz\imagestore.dat

    Filesize

    6KB

    MD5

    847eb3d3a6046539cb803d008c9e0613

    SHA1

    c3b1ae0c82e9036c85ef4e8310fdda6a996e6e1e

    SHA256

    158da89a339e12052215ded1853efd12720a427d221a514fd8eb371e61e5ea4c

    SHA512

    717fce5ccd1d0cf9a5a67356fb887ef6f9ba162e5960caabf3df3efd7d8fc01546257265ad3dc1766bdf61abfbbf2262d0911676f82e8977b86a5100f70d4809

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PULJ7CSW\favicon[1].ico

    Filesize

    5KB

    MD5

    f3418a443e7d841097c714d69ec4bcb8

    SHA1

    49263695f6b0cdd72f45cf1b775e660fdc36c606

    SHA256

    6da5620880159634213e197fafca1dde0272153be3e4590818533fab8d040770

    SHA512

    82d017c4b7ec8e0c46e8b75da0ca6a52fd8bce7fcf4e556cbdf16b49fc81be9953fe7e25a05f63ecd41c7272e8bb0a9fd9aedf0ac06cb6032330b096b3702563

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\6HSK4M31.txt

    Filesize

    601B

    MD5

    861ebdac02eef1478089248ced3ea0e0

    SHA1

    b936981b7b2b4bc1ec93a66d9b20fa88e2c9659e

    SHA256

    e8d8e3809fea42680bbe97058d9b9ba44d3aa6c55f65af764a5f376227726b2b

    SHA512

    3517f88e8d8e0008ad35ed198cf6e4e9dc42ed1dcf7d143ba13b29f9953551f5d9e7bc06009dc44a75ccb4ebfc4cdd94cd69ead441fc5f419fef9f7599c03d41