Analysis

  • max time kernel
    98s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    24-11-2022 19:46

General

  • Target

    https://cgd-oficial.net/

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://cgd-oficial.net/
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1492
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1492 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1936
  • C:\Windows\explorer.exe
    "C:\Windows\explorer.exe"
    1⤵
      PID:1896
    • C:\Windows\system32\AUDIODG.EXE
      C:\Windows\system32\AUDIODG.EXE 0x15c
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:872

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Modify Registry

    1
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\AYEK1CFC.txt
      Filesize

      607B

      MD5

      bc231831ca954d096bfe0f58ae11918a

      SHA1

      ef246f9894c102bdd386b118724b91e147fc0ea8

      SHA256

      9500e45ed3b4b49037433655974480680b7aa2aa6cb97d03cbc1bd89672af5eb

      SHA512

      1f3ccf5bb3b7551b34dfa9f59382a82051bf14c74a2fd61b00ba3701395a25ba849379d93e0b50c9b69faf5150a4f22b0bcd48a6cb30373d1e03e036bcf7d8d5

    • memory/1896-54-0x000007FEFC5A1000-0x000007FEFC5A3000-memory.dmp
      Filesize

      8KB