Analysis

  • max time kernel
    939s
  • max time network
    943s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-11-2022 22:12

General

  • Target

    https://tipaycaintic.com/minercorp/

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 45 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://tipaycaintic.com/minercorp/
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3464
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3464 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1660
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3464 CREDAT:17414 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:3336

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    Filesize

    471B

    MD5

    dedb504b3469b24ec0df79c68f5772e2

    SHA1

    177a8b1045b456316ca32d90aba942bf34774c64

    SHA256

    e18111fd56db31f02eb16990f0bbc7991a0c80571703281ee66010e229c9f8b0

    SHA512

    101312fa01991caeaef010d0d21e740244cb3768490a1b82ae12e7524e50b6e7f2e23c08978ac4c373e9013baa0a8f50de8e1994341556b78ecd88ce13df5680

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    Filesize

    434B

    MD5

    88d61bf9d185b33d654763e0271a716b

    SHA1

    f68fdf0860a5328e61cf135cff2aaa5c13d28c96

    SHA256

    a0c33f3c887e5f66ce8a9b9c2601a8cd0f67f8ce20797110bae7d65e315a8919

    SHA512

    40ed2d9ba5e132785d7fc66aa9d021bf033a31e763d7a68d0da70e0c022d9861c725e327b14f5fc9d69e8d66b12a2a7d79c5cc0f878c6365374cdbf321f8a1cb

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\ckj4gk4\imagestore.dat
    Filesize

    8KB

    MD5

    e0827a50da62b6ea1e03799498a93e1f

    SHA1

    102236c122411049c9ee0bcf6974ebcf5d79c3d7

    SHA256

    46a7af3e0e8cb3a6b3a21a5cdeca54e09a16d110cda50399b44a772a13a5daed

    SHA512

    647dd41b22c6f29af6add8d4dca4a4984913cef88282bdf7500a4e7ade11d0249c30e491ff07083d80dec19d0d8e10f25be8f3994c80b398a406a8e24a7c93df