Analysis

  • max time kernel
    100s
  • max time network
    185s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    22/11/2022, 02:30

General

  • Target

    http://ato.aus-my-gov.com

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http://ato.aus-my-gov.com
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:896
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:896 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1972

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a9ffe2e0e5e45802d31b2fcbc802e1f4

    SHA1

    f851bc36c5a6679eadbb6ed989bbbd904e7e1343

    SHA256

    c2588163abd3c72f5f9433ddcd06e5f6aead8b1dc567bee131efd43574de0f0e

    SHA512

    b959bc1811b86e24c4be67476823ef116b3de4f83577713d7f8307e371f5afbbacbb05346a1aae437575a4d3593707c842ed5de31e4e2f68f012b981271a8f7a

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\mlf2v8h\imagestore.dat

    Filesize

    22KB

    MD5

    2fa58f5c797b79157f0ec88058966113

    SHA1

    2f587eb7de87266eab243a4a7de7e6d202213d01

    SHA256

    a9ef239f1f4274ddab4fec6bd516ef0938fc0aac30b2bb259b91b944a305816a

    SHA512

    50f22d6ca4e7d4b6dbbd76ef70b64a2e38a09918c9b6d93774490f942d9ea08e41860b08130f81091fe3d5fbe3178ae9e32e8c2bece92ca794753e8aa034f90c

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\HDU34A9G.txt

    Filesize

    601B

    MD5

    b80e4e408f4ca50e0098ece2c2f86413

    SHA1

    a8ad666afe2a6a926c842cbc9d636835ad90e3f0

    SHA256

    bcee5cf04173320fc2bcd5d499d8e06dd9973212aea56b1dc4a65a459552dc8a

    SHA512

    825f3491694c84eaba0fd7cda47637ab883b33595ceeef195a2dfd5f1bdfa67532452bed4822b04cca31930d05eccd1a10a9974a21feeaef427b6ec4c44adc01