Analysis

  • max time kernel
    226s
  • max time network
    315s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    01-12-2022 14:50

General

  • Target

    6b99725fc81651fbb934fe29be95eac119c015069ccba7d519dc4c93078910d6.url

  • Size

    78B

  • MD5

    9784b54c872f9ff4eb85222713d89fd3

  • SHA1

    31b5dfda7eb9eda0312e46eefc5c8d4ab6283bac

  • SHA256

    6b99725fc81651fbb934fe29be95eac119c015069ccba7d519dc4c93078910d6

  • SHA512

    61215af6ad118f9f47b1c042be2bae3f91b071da10168937a6f4f44ad1e3debfc900eee621d1744b01cc72c81f431d036d51bd54d15dcf8c96cd30e6ec3f5703

Score
6/10

Malware Config

Signatures

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 27 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Windows\System32\rundll32.exe
    "C:\Windows\System32\rundll32.exe" "C:\Windows\System32\ieframe.dll",OpenURL C:\Users\Admin\AppData\Local\Temp\6b99725fc81651fbb934fe29be95eac119c015069ccba7d519dc4c93078910d6.url
    1⤵
    • Checks whether UAC is enabled
    PID:1000
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1940
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1940 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:696

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\K00PV0CY.txt

    Filesize

    539B

    MD5

    7ff853f9361007823afd46c12dc161c6

    SHA1

    4dbf19bc71b173c80c88ed3f9fe6df1f8bfe7b14

    SHA256

    66e0532c4608b8e4d7ccfbcacfcb25ec8a2dc926370a5b8411b6f41697c87cc9

    SHA512

    51429a75d53ff7f62e9f39fb495512c59248770fb52d439f7174d8c86413182b6654d5a33f3e96453c7a1e5b03e455e01efddbe8a1430ab21d1c75c8f2758184

  • memory/1000-54-0x000007FEFB561000-0x000007FEFB563000-memory.dmp

    Filesize

    8KB

  • memory/1000-55-0x0000000001AF0000-0x0000000001B00000-memory.dmp

    Filesize

    64KB