Analysis

  • max time kernel
    150s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 13:45

General

  • Target

    http://elitecompliances.com

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 55 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http://elitecompliances.com
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2028
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2028 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1688

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
    Filesize

    61KB

    MD5

    3dcf580a93972319e82cafbc047d34d5

    SHA1

    8528d2a1363e5de77dc3b1142850e51ead0f4b6b

    SHA256

    40810e31f1b69075c727e6d557f9614d5880112895ff6f4df1767e87ae5640d1

    SHA512

    98384be7218340f95dae88d1cb865f23a0b4e12855beb6e74a3752274c9b4c601e493864db777bca677a370d0a9dbffd68d94898a82014537f3a801cce839c42

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    08fc501f87e836d146efe4bfbb178af2

    SHA1

    a6544cef074f3f3fa5347e28dfcca3a6dec364c6

    SHA256

    d03c673ca98a01078d12eecffe60f2f8f3a7766be0f863cef96094cde23196cc

    SHA512

    07e82ceb329157973295f82b9f83b6efba862eb981ec0380b3b84e28c019669c506fddc55ad31a1ea6982ec62040d85090fa8842f3021c5aaf1118cf8e3ce382

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\309axvf\imagestore.dat
    Filesize

    6KB

    MD5

    8ecd84c3c3204a8aef575ee51426c784

    SHA1

    91a13e65661a89b5f2c9a809ab1187c9659ab09e

    SHA256

    d3e0e1b8d0c4f5e1c301529f21f063e45e563bc7709b30fc071189e04eda34f6

    SHA512

    2afe14f0b63a134e87e28c6fd0a1f692cbf6ef07117031d20f5d1da5f1585461ecff63cce3ffd3f2a54eb7b77f06797e5ab1a9163e9c968aaad16d318e4c5e7c

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\Q417I02L.txt
    Filesize

    603B

    MD5

    ed89389856ecf4d6d6b516d168bf59a9

    SHA1

    81e2b18320de372c2047ea930c4fc09198df43c5

    SHA256

    768277abb057a895d359338e1d0f0c4f542395072899f304589b268d1b4f4b81

    SHA512

    f49135b5a7b20e9090e60b017e609fd1364702927459faecbd7f1217468c4b2decb55d52ac8d1a36d7239d13d47b26fb659c711beb91076e266450f687fdedd2