Resubmissions

29-11-2022 08:46

221129-kpg9jsgb7x 10

29-11-2022 08:36

221129-khxewsff5y 10

Analysis

  • max time kernel
    167s
  • max time network
    174s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-11-2022 08:46

General

  • Target

    https://bafybeih6vtgmjz67sm64mteg7r2xblhbb27ej6xuwmbe7mdhqnplfsm36m.ipfs.w3s.link/ipfs/bafybeih6vtgmjz67sm64mteg7r2xblhbb27ej6xuwmbe7mdhqnplfsm36m/memzgeneral.html#user@domain.org

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 32 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://bafybeih6vtgmjz67sm64mteg7r2xblhbb27ej6xuwmbe7mdhqnplfsm36m.ipfs.w3s.link/ipfs/bafybeih6vtgmjz67sm64mteg7r2xblhbb27ej6xuwmbe7mdhqnplfsm36m/memzgeneral.html#user@domain.org
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4728
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4728 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:4468

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\82CB34DD3343FE727DF8890D352E0D8F
    Filesize

    7KB

    MD5

    64bd9a644bd182581368e3ce024dad9a

    SHA1

    1520bd16d65200bfa86d889eb88f4f62a65dd007

    SHA256

    5814095df174f580f08019718d2f8d05177276906620e36564588ba4b19ddfdb

    SHA512

    af1ec9959334ae377a1b199a44ec31a3cadc1273512f8a2644eb8b3b21f24d4afe1c0515a3bb685bd35a0856c2d6383504ee7e72ae67f87f3bda0a8ff91ec5db

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\82CB34DD3343FE727DF8890D352E0D8F
    Filesize

    232B

    MD5

    202b5dd4121b25a9a4aac6fd076d6bb8

    SHA1

    2bcbf9e63a037936b69defe35c7a711d6cf2513f

    SHA256

    d39da9a6ab86500c02dcf39c9538bff0d37d260d37c32d903f3796be49f7959e

    SHA512

    b37b7d55abef2c0dedbb5bc48e50c5c3405a41e6ca4da9bf50602d22dc6f8e679244197191eaeaa8ae749cd71b38ec660d46de6ededeb651457cbfcd57761874