Analysis

  • max time kernel
    136s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    25-11-2022 22:42

General

  • Target

    www.3dmgame.com.url

  • Size

    122B

  • MD5

    49cbfed4fa9b3fafdc9d499b6163fa62

  • SHA1

    28decd9138bd3f7b3ef38bf9e40cd0d6305d1cdb

  • SHA256

    03df27e82600098c34c413cc2e45b43638d3ac33666960cfbd913f1c3f9a0b11

  • SHA512

    64e91ed564ef64d7687599012c4728b811fec2661dcb7941374cdd3a8450563073c67c452d97d43545f49182fbda2c26702dd35088723ace21717282d1233627

Score
6/10

Malware Config

Signatures

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Windows\System32\rundll32.exe
    "C:\Windows\System32\rundll32.exe" "C:\Windows\System32\ieframe.dll",OpenURL C:\Users\Admin\AppData\Local\Temp\www.3dmgame.com.url
    1⤵
    • Checks whether UAC is enabled
    PID:956
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1612
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1612 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:524

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    61KB

    MD5

    3dcf580a93972319e82cafbc047d34d5

    SHA1

    8528d2a1363e5de77dc3b1142850e51ead0f4b6b

    SHA256

    40810e31f1b69075c727e6d557f9614d5880112895ff6f4df1767e87ae5640d1

    SHA512

    98384be7218340f95dae88d1cb865f23a0b4e12855beb6e74a3752274c9b4c601e493864db777bca677a370d0a9dbffd68d94898a82014537f3a801cce839c42

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    464bf0a32c89de4624ccca350d73f08f

    SHA1

    abf4e0fd2cebb7319b0260f894cb1d08c05eca7c

    SHA256

    820f23d1a4d81e8b18928d6838d5a22e4a3d9dae05ee145c5b94f027db800118

    SHA512

    7089e7e4e7a88ed984c02d894f247e376cc3b48b0d0d13080c5acf6ff74ae1ef2616b57f847897198124ba1700257fd0c366c5aa3479a52c580285076e537a9a

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\309axvf\imagestore.dat

    Filesize

    5KB

    MD5

    32b259e9920813abdd085d2fd664cf54

    SHA1

    c8c64e7656fc2dc5353bccd8a1e02ed9b1a86ad4

    SHA256

    411e07bc5c5fe6072a890ff1f9376342d2ffc2200461294662e9907cbeccd832

    SHA512

    31ae3b5a482820bb78bf09ace1656d3a348ef08c3a56d810062e47af8b2d028c1ab59fddef41292b45097cc2a1d6eb5a6cf767551c8463bc14483471edab76ba

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\X2WD7CEO.txt

    Filesize

    608B

    MD5

    5a9f90104db104a0fb0c031ea20fcc79

    SHA1

    7e29b83e36e89433d29b51c77ec72f5286e39bf0

    SHA256

    11bfe3ed8df7436bf6505e0dbac1c648e3f1d303ab89b5fadaac2215fd7c8099

    SHA512

    21516e067b4d5ce35f13f465c72acb4796def3f18465b936529bf212502eee2c803725479e586e6d3cefb53ff5acb7cb96fecfe5cab62a89b6e76e2304c14830

  • memory/956-54-0x000007FEFBF81000-0x000007FEFBF83000-memory.dmp

    Filesize

    8KB

  • memory/956-55-0x0000000000550000-0x0000000000560000-memory.dmp

    Filesize

    64KB