Analysis

  • max time kernel
    117s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 07:41

General

  • Target

    https://www.minetest.net

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://www.minetest.net
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:792
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:792 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:684

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    38facfb6f01cb6888710c33ce0510924

    SHA1

    3dd91cd296fbdfbb017ab389df9d0a1dee3e6c69

    SHA256

    2266cd75be1efa8ce3900c17fc274d74eecf498688c60a3ee468693b31b1f7e2

    SHA512

    74996c4c3a6656d840b9bcfa99c0da7984a514bd79127019ef02ca4e5140f24d236df37b997674dca481b6acbcbd5942bbb03baccfb1737798c7c50813db8068

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    d267ba04199fb0443165d59ba990ae63

    SHA1

    ccbc9493fcd3ecb4d7f4aa2267534136caa2dc3e

    SHA256

    7fca1da7d4bc0773cf9dc34587e2877affaef16611b9ed5f9ee92dfebf895e45

    SHA512

    07a0bbe650da6c1b80855b19ecaa56d6eba2b74f949fa831993e453ae83657be62f3629484f0efe4af55cea47c89bdb0d0754b551f0d5a60958145e6045129ad

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    12078bd10047249a8d7176c12104dfb1

    SHA1

    4dd5a357dbcfd62687bdc74bb6d474381b8fbe70

    SHA256

    9fed8b6d2f62fa21465ee63fe7fdc3a97059ecc1854525dbdc1a7e0a751f6008

    SHA512

    672b4d572525bdd4a1e4f9bd257c26fbafa59f88bdd3190796548df3ae9b41953e32d3198f5f7a2ba355f48d11400316a8dbe3a007f73807a9b66082bc513860

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\1wzfztv\imagestore.dat
    Filesize

    1KB

    MD5

    211874703de1934cad28ca813dfd8021

    SHA1

    cd79d2f080c6f6cb24489f76a857e88c76ff38cd

    SHA256

    ffd0d95547c9ad441894db725eef2a6c6aa6e05771cf089b58d48e7512230361

    SHA512

    cdc6dc65304e30f0244affcf12668f08172bfaa5852e75f1fe5485b58ffc56b64fe563a8112a9119cce7f01a62ac994e2d641c7794cd5332e8410712e75875bf

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\26F1Q9H6.txt
    Filesize

    608B

    MD5

    0050a282961fbbfc194f2c9eab288a80

    SHA1

    0f023ea1d31394aeac86d61a958677a6734f2d50

    SHA256

    bf9574a62f13c5f6ba808ce7474b1596fb4112dddfe6189695894f596f832a85

    SHA512

    a1a509bb78aac6dd1f28dcda571438cdaeadba56d0ea6f99a34df2cde144fde8cf3d288375a9df4419e5c53f08c345f205f405d3bf869f103bfc017736fd9a9e