Analysis

  • max time kernel
    198s
  • max time network
    202s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    25-11-2022 22:22

General

  • Target

    24087ee6a566ec04053a5e8ec12612cbf134db3be96ca0f4fdcd14369ed9dea6.url

  • Size

    1KB

  • MD5

    e60f6a0420dc23d72b8c185edc6e3ef5

  • SHA1

    ad805800f47f69208db731ec11d26c8152013a6a

  • SHA256

    24087ee6a566ec04053a5e8ec12612cbf134db3be96ca0f4fdcd14369ed9dea6

  • SHA512

    2fca935f68f007c42b6400a565093c0a6574eabaf039d8fa56b53c63b93d0dbfe9fbb35753dc8b6c6ba0d1bcc2f93d3194fd690749d68ddd7bee508aeb437ee0

Score
6/10

Malware Config

Signatures

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 48 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Windows\System32\rundll32.exe
    "C:\Windows\System32\rundll32.exe" "C:\Windows\System32\ieframe.dll",OpenURL C:\Users\Admin\AppData\Local\Temp\24087ee6a566ec04053a5e8ec12612cbf134db3be96ca0f4fdcd14369ed9dea6.url
    1⤵
    • Checks whether UAC is enabled
    PID:1188
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1772
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1772 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1640

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    5cfc0747c051bf24fac42f33eaefb61a

    SHA1

    b94faf296b60d34c01001404ca016f644f37347c

    SHA256

    7c61d93cc4380e8ccc55ded390ad1461d2eac032e7b6de75e597fd2d84318137

    SHA512

    f263e4adc4f7859fd6f661570ea7656c22249d3cf8c99ab8bcaa44d0a18aff7b97548480543816e376926b7c6bf80b3a63cfb2c9a61b569b07ae1f500b117940

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\YD2XXX7Q.txt
    Filesize

    608B

    MD5

    660780d0623f4f5e9959498c59590457

    SHA1

    eb6c1d877156e4710799f11c110cddd5d1e391f8

    SHA256

    ddefa349616ec4823d935bb961de490768b0398dc7c96fbbd1fb6daacd43fedf

    SHA512

    5c2ead96a2a0712f2fc1bba81a71f6e48520555cd46b028f3e08405016392f0e5771501564d5e4538ea727411e0de61e2bf744521e4e60d74e027e1fe1dedd8f

  • memory/1188-54-0x000007FEFBD41000-0x000007FEFBD43000-memory.dmp
    Filesize

    8KB

  • memory/1188-55-0x0000000000140000-0x0000000000150000-memory.dmp
    Filesize

    64KB