Analysis

  • max time kernel
    72s
  • max time network
    142s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    27/12/2022, 00:24

General

  • Target

    https://tinyurl.com/2kdjdjnr

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 49 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://tinyurl.com/2kdjdjnr
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2728
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2728 CREDAT:82945 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:4704

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751

    Filesize

    717B

    MD5

    ec8ff3b1ded0246437b1472c69dd1811

    SHA1

    d813e874c2524e3a7da6c466c67854ad16800326

    SHA256

    e634c2d1ed20e0638c95597adf4c9d392ebab932d3353f18af1e4421f4bb9cab

    SHA512

    e967b804cbf2d6da30a532cbc62557d09bd236807790040c6bee5584a482dc09d724fc1d9ac0de6aa5b4e8b1fff72c8ab3206222cc2c95a91035754ac1257552

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\1B1495DD322A24490E2BF2FAABAE1C61

    Filesize

    300B

    MD5

    bf034518c3427206cc85465dc2e296e5

    SHA1

    ef3d8f548ad3c26e08fa41f2a74e68707cfc3d3a

    SHA256

    e5da797df9533a2fcae7a6aa79f2b9872c8f227dd1c901c91014c7a9fa82ff7e

    SHA512

    c307eaf605bd02e03f25b58fa38ff8e59f4fb5672ef6cb5270c8bdb004bca56e47450777bfb7662797ffb18ab409cde66df4536510bc5a435cc945e662bddb78

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    20e8723776ee75a4158e8271882deff4

    SHA1

    6feea738778ebd42d912ea7f0636668317eb9ce3

    SHA256

    19839d9d807e7e6c391d4576737818670da14c8828c1259e381ba57f25fb58cd

    SHA512

    d055a975ae973b36514fc6d32d4859fb6dc6bdc4c67f03bd7513e005baf6bd77b23c969a70ba46ed7d4aa90fd86859e7d0c20c5cd04f4b98c377c1a44a8a1695

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CA987FD6A72C3AB73ECC3AD271E860DF

    Filesize

    346B

    MD5

    a2d584ab5813a544a17e959c8ed387cc

    SHA1

    42e49e2b2e8f0444e8ceb7d7cd9e3736ce673922

    SHA256

    98911881b2f34bbf78a1bc8a6c7679b158387971987b69da703a293fcbbdbabf

    SHA512

    5bccb084873e262e2a54c01982b5d9067ef03274a1e015a4fdcc631b22e9bf3bae79bc1dabaad23488640d5e0f26a31de028df4ce829abd8713bb21f881f7989

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751

    Filesize

    192B

    MD5

    b5e0c45c327f0b47b9f34591fead1883

    SHA1

    208e9aa00f306dc120cead28b7ee9be8ff69399f

    SHA256

    1957d0007fb8ff8b68f74f15a2c8ec800699fb0b5c73306efea2c0bb2ec3f3c5

    SHA512

    2d20cfc2b8924c34a102b4b3e2ea738636422e83693726d7b0c8b5815d439300809f08a0abd056baa42f1db37c5c6bc10e0fdff35da2bcc878d10d061a81fbf5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\1B1495DD322A24490E2BF2FAABAE1C61

    Filesize

    192B

    MD5

    56089f55b1c20ddd328d06091a8ac4dc

    SHA1

    3af967f0616d1a9946257ef6a631d22888441399

    SHA256

    d134c5aa003dbb8452285769714106c6c0877c6945a8e58056f20bccd309fa16

    SHA512

    7634e6ea48356fe7219ab7fa3146df3c3e14ae5fd03023ece7f3cea6c42eb34d5b890f5b2145248d1dd089c3595a4466d575a5f03ccbe16b546110fed75f3b9b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    434B

    MD5

    372010d02844ebaa934e70ea8cd79f8d

    SHA1

    fce0d688d68220f4ddc80dc9382e02d996093b55

    SHA256

    1ae22fd9eb6d951a126cc1d9f5556723b56308112dde36e0cbc684acf4be6896

    SHA512

    0967050e3bedd0f9b323db7d7f9797b176f7b0fa7f99bea06c003fa13453c66787ade839bcd2bb07e99a80520069b8112b4f5246aff3a1153fe783ae7e1aca16

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CA987FD6A72C3AB73ECC3AD271E860DF

    Filesize

    540B

    MD5

    579d9aeb15a61db6ebdfd3b115b9deb9

    SHA1

    bfddd690c29e07aad166d1e1761d3139959465da

    SHA256

    d727391678c19e24be994e5a095507dbb96385d291b9f1588da0d8a43f8df9a4

    SHA512

    3ef101f65ad75fcd266f74635d48fca0641fbb8c08f4dc369d85ee4683f6d4bad08ef514f618ee6d537310354297ef57685adae9bfd37c08289c53363c8bf711

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\OERYSHF1.cookie

    Filesize

    610B

    MD5

    c4fd9a617e1bfd37d435c3271e0d9146

    SHA1

    5c143711db1ff22b3c3071de91612c4afe668b74

    SHA256

    ecdd69e972a4989d974df1c878238658e5de8f7f2c0fd80573e9d5c51f2e6b8a

    SHA512

    fe507f693e907b15dda1a39892d3a216195dc4afdf503fbbde035bf8211e058ded519455cc679f7d306b08aaa974d3fb2fb3233581919a3e61edcb1b7d68e0e6

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\UQMGHHJD.cookie

    Filesize

    610B

    MD5

    a52b3645dfae19fa3642958aedc2ca4d

    SHA1

    e4687ceab9d7c7ada4f72a660817f99f24aaba31

    SHA256

    d778f7b0228cb9080d2f47e592b420f76981b1a25f322e37bdf5056c28ff6642

    SHA512

    61a4e909a3931c7f5ca8b4232daf52b7c85cb6e561b12c4e22de47f45c2478576d666ab204581763869d8ef51daff68ada685e85270bd0deded22bf4a64a6425