Resubmissions

05/01/2023, 09:24

230105-ldhavabe63 1

05/01/2023, 09:20

230105-lasbmsfa3z 1

Analysis

  • max time kernel
    147s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    05/01/2023, 09:20

General

  • Target

    https://rotter.net/test.html

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://rotter.net/test.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1532
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1532 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1096

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          340B

          MD5

          f60aaaffa6cfad8be98dbd1389d1d813

          SHA1

          7f6524a10b8f7bdc0c84a98aff0a1a9268f0150f

          SHA256

          54e4e71a56c7c8cc868ef3d8afc2fd3a2d762fb9930296a354cb3037a2a943dc

          SHA512

          6fa6378dd174d78a77602379373dec088412a4104ac487ec3173cb7a9b3d8abd00c37e7eff2e4504daa9d4c3ef45638fca59c503016422d11d5d549fce6eac54

        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\tcz8fqz\imagestore.dat

          Filesize

          5KB

          MD5

          83bdc5b89a6914bb488699d7f2fd4f66

          SHA1

          c155d204cd93ae9be7e00ae6d1c374b1d2bd1b84

          SHA256

          075e80aa485c67a7aa749bdce8aa8d395bcb12bb76a1dd236827e61b7818be73

          SHA512

          6415251cb2ac20291fcead3111faebdaa6a7d500d8bfd8d1d492fd938b02f72268cb709bca992c297379d335e5d0d4491a0c786e67ecbca5f1cc8865ec4ff5c1

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\DCG56HFH.txt

          Filesize

          608B

          MD5

          647cd29c3d9f2e3555c4be74b099b76f

          SHA1

          ec08ae124a564808469bb5e02c8fd5983ddbdb00

          SHA256

          28787fcad7cf67c4e78e9a34394810aa5618988e972703312806838e5ce0ae76

          SHA512

          bff496daa0dec14d84b1ee49b68c5a23dd34b0d7f1bd76d51f5858cf109b88d80ca0fbdcaae8aaad9db3e1943501c1f53eef5ed521a15a7d1639ea380a3767af