Analysis

  • max time kernel
    78s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    26-12-2022 01:00

General

  • Target

    https://storage.googleapis.com/0068be3f1777eccfcdb17d23ffa2f0c6299f19d9c5ff0b02a02cd0eb7489/a82b53fbf553a5c97c1ba6d3bfb380744a645773dc80368e4d8f7cd0af88f76dc6e457#UXN4WmhjbHVaYXhVK0RXSWs0Qk1Ja0hkdTU1UlpHK1VIb0JBQTIrTUE4ZkZYejJmK01SMVdsbjBRSUIrYko3ZG9FVWt4MTBXOVU4RmRFRTRRQnN1UlJpS1hVdnNONVJia2RnV0hkOCtJN3M9

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://storage.googleapis.com/0068be3f1777eccfcdb17d23ffa2f0c6299f19d9c5ff0b02a02cd0eb7489/a82b53fbf553a5c97c1ba6d3bfb380744a645773dc80368e4d8f7cd0af88f76dc6e457#UXN4WmhjbHVaYXhVK0RXSWs0Qk1Ja0hkdTU1UlpHK1VIb0JBQTIrTUE4ZkZYejJmK01SMVdsbjBRSUIrYko3ZG9FVWt4MTBXOVU4RmRFRTRRQnN1UlJpS1hVdnNONVJia2RnV0hkOCtJN3M9
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1328
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1328 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:780

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    61KB

    MD5

    fc4666cbca561e864e7fdf883a9e6661

    SHA1

    2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

    SHA256

    10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

    SHA512

    c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d7967140e6ef6fd049e63c56bd070a67

    SHA1

    e5073f3fe046e69f400f7b58b9bdcfc8dc479598

    SHA256

    9cee9d736c9106e3c77ede2e9e77f94e06a118ad8fd2e0457edb611a60ce4b0a

    SHA512

    c3c4e6498cea9a4abcde51d4106dc990e244ccc69b7f9d633e0ef2425bdafd0f83a00e2825112fc97700724616966ff6e5ce4839c2042432237d143063e1e9ef

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\MU11MDE3.txt

    Filesize

    600B

    MD5

    b60a9aad68d05fb91b4a8bfc014f717e

    SHA1

    2b301c556baf397a508fbb561d599f6e69f1e820

    SHA256

    2dc38147186a36f17cf3ce13b2f77b73f0194e9ff1ca8d4c33d1473a4ce1915d

    SHA512

    1f7a15cfe96b570aac5344e18ac0e220cafc07217da9e83f9a23dd9b3237d909dd63980874d6181c9a68c30837b33e09f4b19e773f66ff5ddce7706b7c906d57