Analysis

  • max time kernel
    81s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    05-01-2023 17:06

General

  • Target

    http://2134930.hs-sites.com/multinational-gold-mining-company-adopts-pointman-to-improve-safety-operations?ecid=ACsprvvkycKrgfHJ1-HKvmmKux_10s7O3kEONAjZX7iKalNEXFZscOEVjnKIteqjQLC6dCJKs51S&utm_campaign=News%20Release&utm_medium=email&_hsmi=240516523&_hsenc=p2ANqtz--do1AgqBVZWbbCGa6kcqFu_Het7NHqWzRzVbKMFIFBFSUau1oplq6q-48EfO4mxhG80eY378iYpThy0dKQtI2g6OcxmA&utm_content=240516523&utm_source=hs_emai

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http://2134930.hs-sites.com/multinational-gold-mining-company-adopts-pointman-to-improve-safety-operations?ecid=ACsprvvkycKrgfHJ1-HKvmmKux_10s7O3kEONAjZX7iKalNEXFZscOEVjnKIteqjQLC6dCJKs51S&utm_campaign=News%20Release&utm_medium=email&_hsmi=240516523&_hsenc=p2ANqtz--do1AgqBVZWbbCGa6kcqFu_Het7NHqWzRzVbKMFIFBFSUau1oplq6q-48EfO4mxhG80eY378iYpThy0dKQtI2g6OcxmA&utm_content=240516523&utm_source=hs_emai
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1504
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1504 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1440
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1504 CREDAT:472077 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:684
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x514
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:912

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27

    Filesize

    1KB

    MD5

    fb14d92a68b237a24b79df0210ccfd7e

    SHA1

    90165f9668cc3a176c1170763502a1f293915458

    SHA256

    e6af7ac60c1ba8a9d6cfa4de33dff77f6f3d39628a99128ddd8ea1b65b9cc2d6

    SHA512

    0d5ebcdb123d7350017e865062b492008ddaa80327bf9174a8b0014be0c4def5069645ee7b29b1292c98e1253361dc2f609b3e5252c9f037b841253cd6eb1034

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    61KB

    MD5

    fc4666cbca561e864e7fdf883a9e6661

    SHA1

    2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

    SHA256

    10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

    SHA512

    c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27

    Filesize

    438B

    MD5

    c0656bd20f488d5c3f7e47e83416f2e4

    SHA1

    1ae4314f3ac6a0011d82e790d9d9528c0c28d13c

    SHA256

    47ee40403416a2ecc8f8b77f8d3b32eb5f6c92b5a92880704b1f4933b11a25b4

    SHA512

    5b4ebae8e1cc00c1a74dd82f7965fe9f40797193ff324265adf548baf3acd8c908cdc0f62e7954e2d87c68d2b53435564a629cf8095cd4173a2f41652a7d0278

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    63daa6bc43e4a431d6a3063b074cf530

    SHA1

    201297fc4c9d9d6f9e3e4dde316348d47a3127e5

    SHA256

    49af749007b366db64585828f2729bc7f6c8544bd8d73b0645ad1b51d668f15e

    SHA512

    83db38c28e00d012628a9f7c0bdd3f64ca9507941db19365b812a4c606297148a2cfb4ad4779ad940880b75e525dcb57b2078c032db34e8f6e06f814788c222c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f7fb1eb09584a63ee4d2897c9c7f37bc

    SHA1

    1929905931c0295aa4fe8f568a1cc79e7d8445ce

    SHA256

    865331a2ceb4f1386c97671d1a946ecaafb93874abffa577eaac07c7514f77c4

    SHA512

    e02895e1c304ac388643c67ff5d8d45b62809935edce03700f7521877559d7a09d882cbf730056a8cd3f76e1c8eb91dfaf13ea129cb7ab67736a700921ece9bd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bfd5c2c64f5efc53691edc3d88420304

    SHA1

    89a9eb5b3050e401ef867b9464aafd367bd02987

    SHA256

    bf78bc9c5c48ec1c8dbb872bebc837588fe769032897588a57855edcabdb1859

    SHA512

    29ee85de17e14d03e204c2b66319f93ceb4d8eafe30874370e295d82d4a7ef9ff307ce8173f7b391006186b2a528f787dffeca48959bcdffc067a35d4bdb4b09

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\t9o3c8r\imagestore.dat

    Filesize

    886B

    MD5

    fbb34fc02886987663a5fca378f315d7

    SHA1

    4e1022675da89487240cebb0e4aa5e93e37468a6

    SHA256

    05181d5ac0c92b2fbbdcf4e1c48013e0d0ba9dc87e39aedee3a38eb2d1110abf

    SHA512

    58b010bd3974e81896b3d1458958bc5d0efa0399014cfa1f341ff32cb70f2df0d89dd85b96289467ead9b7bed81bff6787b5fef5cb12c3e4e854e25b61938cc2

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\C6QUBHMY.txt

    Filesize

    608B

    MD5

    756def6973e5a98d4c1b075546b7268c

    SHA1

    65f19e36fe92f2dcd88f1b1ab3abb3963070eab5

    SHA256

    b0c10347c14abd5f38c3fea213c8c5bd4b8829715862af1997831c0af776db9e

    SHA512

    e466e4eefaddf29fb1ae98edd513191af89fd4146c5b1587ba40b88f0dab5f5727eca335d95b4f52e9be04e0f31eb2c221696f05fd636d381328be90deb84e6b

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\J0D8ZNK3.txt

    Filesize

    591B

    MD5

    3bc95615a35bc4cf2ff83ec54e47b1d0

    SHA1

    cf286574d0b686d93db5050f558e9d71914ea564

    SHA256

    4f88ed8662cbf9cf8b4e3128e0959503c0e290528aedd26576b949f5fc37fab7

    SHA512

    931dbf9a3224e17acc14abea7aec1fd9f5c92497f2e02aaca6b9aaffbad5456e9e5b55935531617d39704bcc76a7bdb39b08c47c8ddb21d86d5387de459f2405