Analysis

  • max time kernel
    174s
  • max time network
    196s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 13:36

General

  • Target

    http://m79.lv

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 48 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http://m79.lv
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2024
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2024 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:664

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    bf0b03e38433c719ccbd2841ba2c4551

    SHA1

    ff7ea0b75860e899d4f753b6dbf114041d670841

    SHA256

    7bfae1a910e402b0492b7cab6b8067b25a52f8ee4301f4ab0b8a5bd6049d4af0

    SHA512

    7e5fbfc8f097e59bd0947c376b6823d8641d934f00ef48521979e1f89098caad536e564f88fa53a3292d475a85fb8279865632a99ef13378235c0ee60fab46c7

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\t9o3c8r\imagestore.dat
    Filesize

    1KB

    MD5

    272c12868d84710455c093d8a951feea

    SHA1

    f95fa440111271aaa8b11962b557d49fa4ac786b

    SHA256

    f99ec658229c41629605c66877cead7e088a6464477ebd8c10936131d17087b7

    SHA512

    edf4a9ef2d1778a33672bd746e919f4dd6ceffff05854a657768a4c14ca24253f493ecad8fbbeaa4884fddcbe0ae64eaecec57a1b1e2036354045c812f49003a

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\KNKIMWCC.txt
    Filesize

    608B

    MD5

    244dfae36b981a7575f592110a5947ad

    SHA1

    48510266e3bc8b1cdc336154ceee0d6735f40649

    SHA256

    cb1f5438c858c869c16d1147680cd2fea2750842a5153154b7fd06fc77411e00

    SHA512

    60cec24288dd718602a23f94be725969b49b3ce4ef1d720350aa1e74d5cd48afc57361fcdc55110fd5858704cc7209f2ce91bdc67ef86a0017eeaaca593cf530