Analysis

  • max time kernel
    77s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    23/12/2022, 01:12

General

  • Target

    http://realtor-com-real-estate-homes.apk.watch

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http://realtor-com-real-estate-homes.apk.watch
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1980
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1980 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:580

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

          Filesize

          61KB

          MD5

          fc4666cbca561e864e7fdf883a9e6661

          SHA1

          2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

          SHA256

          10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

          SHA512

          c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          104f69611f480b5702667c4459cc9742

          SHA1

          6d2bf4dddbde73f16267fdcc313caa4346504205

          SHA256

          d796b17257704576c13b445fbd20c844609d89e619645d31315a7c91c4669ee2

          SHA512

          67f52d86977e1ee199640d8eac1b18e4e7caa27cddbecf255cf15596f8c2220be8bcc32aabd927a3fc0445a3ff3a3ac70ddfe92d5695dd0b5789e4ebcccafdd7

        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\t9o3c8r\imagestore.dat

          Filesize

          1KB

          MD5

          773c7a4b1e3e38ee3ec5d69e28078c80

          SHA1

          3fab0c3c0160bce204bb2eb4060ef2e1347e255b

          SHA256

          5ba58ba4ef6e3494652677da7bbdac8bb8a972a8308649bcbdffc6db4d7b7efb

          SHA512

          894fb9d0832a6c75f262ffabd0b26467b5e96cc88a694de32725f42c1c609be3c20449e6b501d48d9ea75fde3301ad13f702295285cb844835de8b33921d48d5

        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\t9o3c8r\imagestore.dat

          Filesize

          2KB

          MD5

          ba266412bf82186f425f5eecfba653c2

          SHA1

          3d61f9de86897c7adbadefcc72829d29ed3891a0

          SHA256

          f92a89d76a0871567dc9135131dfa7a5981780ca49a1787bd1136a1e877d506c

          SHA512

          42fae50192389c701491b90eeb5c0d8bb56e99514be11e6a12c4c293a7f7f3947abe8da8a003588bb2da04b2f1be0980ad853cc749b0b7518ab618451098523a

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\FOLQKGNK.txt

          Filesize

          608B

          MD5

          406e9a299faf926c67244037f49eb93c

          SHA1

          e34ae1766457775c2b26bcc8d303a1d60d214cd3

          SHA256

          d51729fd1239862aae7c0ee51e32b08439c2b31cada25096ae1f201b6b1512cc

          SHA512

          723ef7a2a910d5546d9a750958cd8ccf37064f15512710e944f6a20ec43cde313e2e7385483d6124bf4b61557fb7293803825527f24d593c444ca1249b29802e