Analysis

  • max time kernel
    67s
  • max time network
    156s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    28-11-2022 02:38

General

  • Target

    2006֮2009ͨɱȾ/77169.org˵.htm

  • Size

    4KB

  • MD5

    e3917c7f4410faf63e3bdcfff5c33e81

  • SHA1

    6848c2917ccc5e24578105ab31dcb23e451bcb10

  • SHA256

    a05f31f26ce57b9e2d9bb6b242731186374c2a0b11d1723af7e107f2dac51ba8

  • SHA512

    8b4fc3b9faa01722e49064f1f027f91860d0c7e6c8bffdcfe4465d6860857f0513784301902a10704684b8b706e9deddf0d39ad53db3f17ae09fee63eae7109f

  • SSDEEP

    96:m1OQF/fRA2RWhwM6wIm4yRgJ/Snq6kVUVTWn0M9tJexGTHwG6ak:mXF/JA0Vde4JJ4jW0MH4xG0G6

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 52 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2006֮2009ͨɱȾ\77169.org˵.htm
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1364
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1364 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:660

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    8ec5723d50622dc70de14a09e720af92

    SHA1

    66a05ebd2ce8e231e7095f959929abf969940b72

    SHA256

    0ac9a1097ee5cd4a12176127df5ae26c75277676b6faf14e1cf88059fe386cee

    SHA512

    1d4833e58f85f4f237487a5587534e4af43eed0232a8f3ce8574246630c4e4d3ffe9cee6015614797df3e66ee2cec7491109464877317670cd6a7617d2501cb1

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\309axvf\imagestore.dat
    Filesize

    5KB

    MD5

    1448ba1e3751fcac685914971d04086e

    SHA1

    2fa01d82c159522b816d0cdf77960e58296006c5

    SHA256

    a96797e4329c005f12cf9820229b1f22744a3a6e450367a263a5d29290c169fc

    SHA512

    d3a85fd0a2e111e229bb61cda95cd8db36f89ed8491c468c213c52fe18265f94ed98d8051ab77dcfd1804c7fcb27cb046330d635963c1a19b8414630788f996a

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\ZGD7KFID.txt
    Filesize

    603B

    MD5

    a479f21eb7e21c40fff96e10beca75c3

    SHA1

    f8511a80c62451e96e438416d5eaac302ff80a6b

    SHA256

    906c114eeff41b2564e8123cbf2798eb5d41f31e5a7afef56cec42bf503ded57

    SHA512

    fcaba9ae01e51374c79b2142bc57595f03c7dd1309dd3c9ebafedf0fa2ad331b582319e7671f689d7bec3ed656d7cd10fef10fbfaa901f87b2294b05d71b2fad