Analysis

  • max time kernel
    134s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 09:41

General

  • Target

    http://promos.fling.com/geo/txt/city.php

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http://promos.fling.com/geo/txt/city.php
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2020
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2020 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1080

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
    Filesize

    61KB

    MD5

    3dcf580a93972319e82cafbc047d34d5

    SHA1

    8528d2a1363e5de77dc3b1142850e51ead0f4b6b

    SHA256

    40810e31f1b69075c727e6d557f9614d5880112895ff6f4df1767e87ae5640d1

    SHA512

    98384be7218340f95dae88d1cb865f23a0b4e12855beb6e74a3752274c9b4c601e493864db777bca677a370d0a9dbffd68d94898a82014537f3a801cce839c42

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    97381f82ddf1368cb30b771d0a2db017

    SHA1

    94bd7abe6624379b6421f239b1cb27964ca374b6

    SHA256

    e7c733969965aede2226f844138efa411dfa0c3b7498fadfb9eb6c86959b0b45

    SHA512

    d21d0433500c9bd1dee70cb570f2a9d38af71376253545bb468ef2be31db91416d8487ed1cfcdda91bbabaf37eec7a48d7f7b4dc7d6a01f3e5cddc75c3d6f917

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\tcz8fqz\imagestore.dat
    Filesize

    19KB

    MD5

    7c9b370de1f8b4c3568bd03f571fd40c

    SHA1

    dd1d93f1cc8b1b6f3fec040395baac0eae97eaaf

    SHA256

    07a677e17dfa3c8c60be60061048a12da578e81a71637c585d084999da0404a0

    SHA512

    19b6456590572f49a0ce7bb3ff145eff299860ab5cde7a7b1c9753b2c3b15bf3217ea29aace9bb9f540592cf38756b4427c6c432a6f595b9760539ab4f864340

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\DHMG3C34.txt
    Filesize

    608B

    MD5

    d65834e68cd601506c4a5918f282833a

    SHA1

    153bcd16628169c927037cfbf0c8461a3832a38d

    SHA256

    04862954a895b1296bd2f0263a2418152f37e083c9e84d67c0200b61ef857556

    SHA512

    a2265ee618d8a1130f62843faed4afcce76a682e4c941058002a2af1d5ce9f42f64b1fdecbbe31217d9b1548ec26bbebef402f8a7e552718b2491cede38adf9c