Analysis

  • max time kernel
    135s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 13:33

General

  • Target

    http://www.vgrouplimited.com/

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 44 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http://www.vgrouplimited.com/
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1456
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1456 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1988

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    61KB

    MD5

    3dcf580a93972319e82cafbc047d34d5

    SHA1

    8528d2a1363e5de77dc3b1142850e51ead0f4b6b

    SHA256

    40810e31f1b69075c727e6d557f9614d5880112895ff6f4df1767e87ae5640d1

    SHA512

    98384be7218340f95dae88d1cb865f23a0b4e12855beb6e74a3752274c9b4c601e493864db777bca677a370d0a9dbffd68d94898a82014537f3a801cce839c42

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    a243fe7bb20d1999d6098f5dc78c1887

    SHA1

    eca31e525fce64cba689dfcbed6090c17ee9045c

    SHA256

    7a8efd3da6a03085ed1564e6c22981d434d4f38354439288275b8fdeded71d49

    SHA512

    9b51085a3498b916fa27a80825059cd681d1511da347b5a2d36818c113a17351ae38323854a6ee11f5b0ee4abeab67883221436a55edb5d86b9f08827d10c2c2

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\309axvf\imagestore.dat

    Filesize

    13KB

    MD5

    0679ecda1c9370d2092c2e27a1fb5e25

    SHA1

    e61f8efdc68d3376830ce8d080ac13465d484ccc

    SHA256

    3e1b3d510ec4df19f78ecf5f5ab470e83d118709834755fa452cd450b68eee8e

    SHA512

    8cb453eca14ea6dc964dfc2d4bf90713db2d4ebe2d4a61fe564d037b2161f088af7c8808973d1ce648cd1b7764e7143e620016fb85318ff30888e4c23c0cd03b

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\YK4XB7LK.txt

    Filesize

    608B

    MD5

    30f8861ff122f8b5758450a520e8f1cb

    SHA1

    faa654f257c94fcfbca39ede1262a8f8d67f758e

    SHA256

    090fedc76ef0b72871eba59eac23830eaacb2d34eb4ab39c95b167a0340d3032

    SHA512

    9f90e5eb3eddfa9747d3816a3fd3425bbacd0e7dd5aaf455e2a5f83b96a51e03f9c9ab9ca0d9c05abde3af95ce38a707c47a2a5d529d056470b2ede72e79a754