Analysis

  • max time kernel
    125s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/12/2022, 15:29

General

  • Target

    https://github.com/bbambiku/promo-gen.git

Score
6/10

Malware Config

Signatures

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://github.com/bbambiku/promo-gen.git
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1644
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1644 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1684

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

          Filesize

          471B

          MD5

          0596eb5979e4b90684355a9bca919987

          SHA1

          6d6c4e90e3cbb5bde7e3de71dd46682f35e41515

          SHA256

          70de11ec7f75e36a43f7552c1def7727d175566252f9d4ccaba3c8db4a1639bc

          SHA512

          89c98a71584d6dc0144570e19b904d0a2b92292e35cbe5fae303787ca900cb8ec29f17ceb4106a2dbc16d0ab98ee6c0ce1d399e59ba7cd3a97b566e8d76addbe

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

          Filesize

          434B

          MD5

          196f402ec3ddb98037c2ceec1aae9890

          SHA1

          aa0b11d703caaaf3337c005f78b2fa63f9749ee7

          SHA256

          85fdd53a04b99ef2a945097c3c6be48be504d185ce2095424b22f717dc58940a

          SHA512

          e23c41a68398e36e996d6aa22edf56fd51594b22b5dc952ee15795c19164111121ac2f0440588f39f87fcbd077ae9f4b89016ef9d322ea9de24ad553523d829b

        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\dqptnfu\imagestore.dat

          Filesize

          1KB

          MD5

          b4aab2a74edae30e515856e6fcb1861a

          SHA1

          0ab0aabe8429ad45261d1a3382e347d2fb6f529c

          SHA256

          b73e16ceb684637b6cd252b516cc0bd2fb5793670b0e5272f5e520e1f85cdb2b

          SHA512

          eaad8bccc742b93c36e19b2edda8c56dd531a54392034dcdce63a51e81ae52516fd7f0ab7b61838e37ee809d9a6ddc6a244e8b166544cc67360f10889c490f28