Analysis

  • max time kernel
    129s
  • max time network
    203s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    28/12/2022, 06:29

General

  • Target

    Princess.Conquest/IGG-GAMES.COM.url

  • Size

    196B

  • MD5

    882e17d630d74b64a8176e38e2fadf7f

  • SHA1

    d6652d568db451c03b73eede688e0124e2d54ebf

  • SHA256

    6d905d76e7d807c5831231d791f2510160dd56018ae423a037e7ac88fd19412f

  • SHA512

    2baac743dabdbf133583c4d500699673e0bb2b2ade89f0a660eb17bfb440f1d74814ade3b82eb07d776f6a7c1b1975f25c6c1c500edc589897bc304a9c9fb3b0

Score
6/10

Malware Config

Signatures

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 45 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Windows\System32\rundll32.exe
    "C:\Windows\System32\rundll32.exe" "C:\Windows\System32\ieframe.dll",OpenURL C:\Users\Admin\AppData\Local\Temp\Princess.Conquest\IGG-GAMES.COM.url
    1⤵
    • Checks whether UAC is enabled
    PID:1160
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:544
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:544 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • NTFS ADS
      • Suspicious use of SetWindowsHookEx
      PID:1884

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    61KB

    MD5

    fc4666cbca561e864e7fdf883a9e6661

    SHA1

    2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

    SHA256

    10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

    SHA512

    c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    191c9e89677cdb0c7dbd75ff157ccc99

    SHA1

    9a10cb018522155d27d647208ae7f4cb3875d92e

    SHA256

    7b12b37428984417c70e3c4733b9defbf26be79b05d7445006eca39801966e82

    SHA512

    c19566a887a5685a6dec5aee7d149936a38cdbec49f6374360a8ddeb8b48e112ec2f94ed32cfe2248eb48d39c3593315730dbe7229c492e6130ac133b6ec6dcd

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\309axvf\imagestore.dat

    Filesize

    19KB

    MD5

    294655d86ba7034208fffe7033673f32

    SHA1

    0351243590cda00608633bab7449fd6a0c95fccf

    SHA256

    54223b8a3748f606905a80c68727ef5b683b650b25befb272601de14326afc2d

    SHA512

    15a848e7a694bf4ab31fa4afb6d80277c58b22f7e65803d015f31dd819a1a332d13c1af49d127dab5e1d5dc0b8f3f39712ea35de732c3ff0679832a54a76cd2a

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\2PNYIQN7.txt

    Filesize

    608B

    MD5

    09d3607d1e6816417e706744adbeb9e5

    SHA1

    015632fdb4e04cdeb04b88c9cd1a82a4ed10b2e7

    SHA256

    58f478b6b6390ac7405f7a718fe54f637ccbb3ef2daccd6abd02f409c6a5981c

    SHA512

    5d6bf39679ba059522b3dcb1056edfd5320cb8daa44510235f3c9fb5dcfb7f15f525d5ef17db52e423412608dcfe1ca10c3b6ddd0ae18d81a8ccd3ca08007a08

  • memory/1160-54-0x000007FEFBE61000-0x000007FEFBE63000-memory.dmp

    Filesize

    8KB

  • memory/1160-55-0x0000000001AF0000-0x0000000001B00000-memory.dmp

    Filesize

    64KB