Analysis

  • max time kernel
    253s
  • max time network
    264s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 11:08

General

  • Target

    https://github.com/novihacks/novihacks-advanced/blob/main/novihacks-advanced.zip

Score
6/10

Malware Config

Signatures

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://github.com/novihacks/novihacks-advanced/blob/main/novihacks-advanced.zip
    1⤵
    • Modifies Internet Explorer Phishing Filter
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1220
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1220 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:580
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x50c
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1372

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4c646bfb7f80ae3b0f25e817461ce848

    SHA1

    abebcacea724fc7a23b0af8dc5e083f59b96a2fd

    SHA256

    520ccfc7dac8e8ed67192406485bd2da365a7c7d410d9e824e41022323dd03d1

    SHA512

    ed2cf75bc85c571f004fa36d4cf2530e4049ee938f2d250f41547d41082f89b0bcec879c2962583291620084d6eb0e79aa1ea6de1fb71795344dcc203b7f4e82

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\t9o3c8r\imagestore.dat

    Filesize

    1KB

    MD5

    2188c4ff26ee91831f352464f1eaa230

    SHA1

    cd69e713ee56b7703651ace59f9e8271b1c7311b

    SHA256

    df7276ebcf65822d227a2992061921b6db7b654ce46ad8d60836740da9356ca1

    SHA512

    7d4b91089f8c29db9453df7b69028b88e805a1ff97406cd2604a35397b2c9d313801e185a75f21a84be76c454fe1553e47df853db112a6131066d1b1e9ab4d16

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6OB1Q09Y\novihacks-advanced.zip.se9eu1l.partial

    Filesize

    17.5MB

    MD5

    cf779a02aa4479a0fe9c93374b8184b5

    SHA1

    7b43795b03017cd57fe11a896161851202139962

    SHA256

    1d9049dda6d9dce99f914fbbfb4b283b08e16d093f19edc5ac113e901e725d2d

    SHA512

    5323fd4874a1944093ec63db075fd56d36c570777fdac84de4d89c788a09c2ab9da2ccc8628afb31fb86d2529925e489f1b8b8b0cc2c2aeda920a66ca5fc5b18

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\LXW0ZV7T.txt

    Filesize

    608B

    MD5

    36965604349d28008a2163ecdd8c58b6

    SHA1

    0dfc8cc24489d1e0f79bc4326802d8428235182e

    SHA256

    578d75edb64063ba34ce8609c7cf3e232e873d55e77ea0cbf15d58a65ec45841

    SHA512

    948e551d19b2b12fc8f85680fadecbb4c10da5af388901e1f2c40d4d83ffbc7b2b1f8497944f4fb4f58342a8b72ef176cb2aca2c0e8fbc49157e57c56979a754