Analysis

  • max time kernel
    82s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/01/2023, 15:04

General

  • Target

    https://github.com/F-r-o-i-d/Rust-Cheat-Collapse-updated-13.12.2022

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 43 IoCs
  • Modifies registry class 3 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://github.com/F-r-o-i-d/Rust-Cheat-Collapse-updated-13.12.2022
    1⤵
    • Modifies Internet Explorer Phishing Filter
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2548
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2548 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:4632
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:3660

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    d0fa3e14aa98e722c09df687a47d7e47

    SHA1

    862090d91c3e7a7febb6802565711bdb162a1996

    SHA256

    0a77019c86c91365155246e0dfd1b87604b9b59dd473fd8e3196c79b92e46005

    SHA512

    9ec6f58d71dfd92028caba9cbda737ef9b9df4a300cef25d23c1ed3280f2ca0679bfc97a9da46aa0e6b87f0462266b721329cbb31c93989665667b013225f476

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    434B

    MD5

    265d5cacea1dc178aa8ede7bb54f4b0f

    SHA1

    a18265f0b4a42eee8d19308c973bc7a630c3b22a

    SHA256

    b01eb5ed6a1f9df45f152635bf873b1bda7c4b3fbf74d987e8b8adc229f7b8f4

    SHA512

    8cf83356c7a8faf41cd75f4af4a7a79626feac7189a6c400bbe49e7b66fb1849a0959cce95a4af830d880ed99db57444f8fbd4f3c81ef22c9ff671928f756a39

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\3mhxqpl\imagestore.dat

    Filesize

    1KB

    MD5

    d17a9a1b4b1a9b822a8898527bf00851

    SHA1

    53dec8b6b1540e5a8588bc4545c2fec17e43819e

    SHA256

    2dbbc698a0ceef1d645800cf43d38cd0a2db55cc141919311ec056f200e8098d

    SHA512

    b2d46b8fd9bd0433b51f46888a5ff75df923e671f3eccb6ef8fec1f42e14872b5b20d5b3e24a3a2f91a19ddda07e2a5c9e5da3116d1db64caa62a25c19b4e229

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\3mhxqpl\imagestore.dat

    Filesize

    2KB

    MD5

    144b1eeb57487d1a478c9373d5a4bf11

    SHA1

    490dd6d0c1474b273b8996a739b13079728363c5

    SHA256

    c7639bed871d1a73e077d76de89c508428b7c14339844af4e25a303208f5b5da

    SHA512

    a314e3cea77762c45cc3d87f7a1a327c7316ce1ffd0cc4ddba67367fe545c28a3f6bf2e71fb6be58e7e3e6928e4b098c05900814b217072c288540d9d541c2a9

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\6ETIP3O1\Rust Collapse.rar.nkvj6hy.partial

    Filesize

    4.7MB

    MD5

    56cde07f1ca1594fd0fd6cdd03695622

    SHA1

    e6dfcc3d55265a22235778faef06874a55e2e1f1

    SHA256

    8de751ea1eb9d56bda91bed6fab437f551c8355a4c59cdc1b9ef9dc45ce93953

    SHA512

    849d48ef9d1456ef72dfd1f7a7955ae851549a2fe8160ba8effd65ad8e3aa606d17cd4129815ffd7700907c90adaefedae0eb7bb1f3b24206361508ca2a1ca82