Analysis

  • max time kernel
    165s
  • max time network
    209s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    25-11-2022 01:30

General

  • Target

    https://kacy.net/.../wp-include/indeex.html

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 61 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://kacy.net/.../wp-include/indeex.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1792
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1792 CREDAT:275459 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2748
  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1096,6864736827112115905,14837116213141005027,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2096 /prefetch:1
    1⤵
      PID:1800
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1096,6864736827112115905,14837116213141005027,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2084 /prefetch:1
      1⤵
        PID:1760
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe"
        1⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2244
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2244 CREDAT:275457 /prefetch:2
          2⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2756
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1096,6864736827112115905,14837116213141005027,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3336 /prefetch:8
        1⤵
          PID:2264
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1096,6864736827112115905,14837116213141005027,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=swiftshader-webgl --mojo-platform-channel-handle=1016 /prefetch:2
          1⤵
            PID:2392
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1096,6864736827112115905,14837116213141005027,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3916 /prefetch:1
            1⤵
              PID:2444
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1096,6864736827112115905,14837116213141005027,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3856 /prefetch:8
              1⤵
                PID:2516
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1096,6864736827112115905,14837116213141005027,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3360 /prefetch:8
                1⤵
                  PID:2552
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1096,6864736827112115905,14837116213141005027,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3764 /prefetch:8
                  1⤵
                    PID:2632
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1096,6864736827112115905,14837116213141005027,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1364 /prefetch:8
                    1⤵
                      PID:2640
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1096,6864736827112115905,14837116213141005027,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3592 /prefetch:8
                      1⤵
                        PID:2992
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1096,6864736827112115905,14837116213141005027,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2676 /prefetch:8
                        1⤵
                          PID:2636
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1096,6864736827112115905,14837116213141005027,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3548 /prefetch:8
                          1⤵
                          • Suspicious behavior: EnumeratesProcesses
                          PID:1728

                        Network

                        MITRE ATT&CK Enterprise v6

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                          Filesize

                          342B

                          MD5

                          91b5477ea873062094214391caa0c0eb

                          SHA1

                          fc66755ff1cc3c62f33998051ae10f7b9a828c2e

                          SHA256

                          0da1a38a23f25ec7f70219af2e4c405341c16b57f7e5a837b0fe86218d396f2d

                          SHA512

                          f7ca961243197870bb4a4304c6114146817aa12217c00f3055bb1b46360737c5b61e0fdceadab3bc316e9f130e0369c82eda4cee7eed2d3454bc51d455b4f8b9

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                          Filesize

                          342B

                          MD5

                          75c6460769b0d6e17f378dc7e6c72573

                          SHA1

                          45cdf2210d15d263800280eb43b387ec916ab2ab

                          SHA256

                          e95037e1f4ba493870a33e2a70af1a4fa300fcf75c204be8e0ef805ce664bd45

                          SHA512

                          4f8a9db1c832a6a93a77bc4de9254cc92cf32c8347d40a4cc19b2952d4c03de97345c8bffdcba43f5a4ce1dd6a845ac1b6bca5255bea42e8cbd72926d875e6ff

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                          Filesize

                          342B

                          MD5

                          0de61e3dbbaf1ac091408dc2cb7518a7

                          SHA1

                          c6542a318ef4ad79b581f7b5edca5c7c5298de05

                          SHA256

                          bf7d82168f35093f919c52c6459193042513b1faacb75c967aacc2e2cd161ce9

                          SHA512

                          1516dac6b51fd1ba65b4f596567fc71fd92fa75aba446a8731cb61a8b64ba688c246ba3a186082d27883592a1f5ba60138d8b6f7be661da986d34bdbff79fe91

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                          Filesize

                          342B

                          MD5

                          0bdbf31912dfcc645ad6a5c8ce5fd3bf

                          SHA1

                          3773cc1f40d5f238418c06550b9a728c22f479b5

                          SHA256

                          6f5c30ee05b5b723436409bc69aa2ab989634a0347cc14788690c97b96c9943d

                          SHA512

                          71a4075e9c68d391d839861a52d3ce94fd5c35f33b663b99271d63b3c96322b68e0e4490cf325e367be472731a9fb94110d838a98fc48e47b584a7f378e8296f

                        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{7414DE60-6C69-11ED-8045-767CA9D977BF}.dat

                          Filesize

                          3KB

                          MD5

                          e1f1ffda7da0e722fa7ff632c9ae8399

                          SHA1

                          05f8536feb24cbeb3bf40572438d243d2f7249a5

                          SHA256

                          32e2980b1518ca85e98abf07638309311d40bcfda51019c8c1ee4fe367f63d1a

                          SHA512

                          d36b0ee490941bde05db580391eb9d38d5659851d5e478d73154119602b27d5b2840629097fe162a8c1daea0c7297d9c906cdef3d75ad817fb3b980774ccb4cd

                        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{74150570-6C69-11ED-8045-767CA9D977BF}.dat

                          Filesize

                          5KB

                          MD5

                          142ae8aa58ebedc9c3835a7a421f1085

                          SHA1

                          b1913348ab3aac72521129485c1b51ec99f3d504

                          SHA256

                          3f45072dbf47a92dfa9001170d0ee04805fa5eb26eb0698c45373420242eea36

                          SHA512

                          8f5ce772bac04c8e970f3eabd261753b3aa4f4d8428bf55109bcb9cabd5e95d7affa504c247030cacaf7dca246ebf1dffbe0e9e3acb59c10ec287e3d5439ce24

                        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\2KLBXL23.txt

                          Filesize

                          608B

                          MD5

                          9ea97e5888ef2ba4b31d91ec269c304f

                          SHA1

                          a4f7973348964b674ca640c78babd8828a2a9f80

                          SHA256

                          b6573f7b29d0f2ff8af1d9911525a5063a87a9224b8389facc40aade8f672965

                          SHA512

                          26ea02e9520f953f4c5f9121cb63edf67a3d9a5802969147ba5af3bab9911eb4b4975b0efe8ae446da77c3987a2bee255fab7263de37c4b87c21263f4859e1f6