Analysis

  • max time kernel
    234s
  • max time network
    194s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    06/01/2023, 21:21

General

  • Target

    https://chat.grupo-whatts-free.click/LPJttvNoGX583VW5BzoPJ8

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://chat.grupo-whatts-free.click/LPJttvNoGX583VW5BzoPJ8
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1740
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1740 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1172
      • C:\Windows\SysWOW64\msdt.exe
        -modal 786772 -skip TRUE -path C:\Windows\diagnostics\system\networking -af C:\Users\Admin\AppData\Local\Temp\NDFA287.tmp -ep NetworkDiagnosticsWeb
        3⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        PID:2012
  • C:\Windows\SysWOW64\sdiagnhost.exe
    C:\Windows\SysWOW64\sdiagnhost.exe -Embedding
    1⤵
      PID:756

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\NDFA287.tmp

      Filesize

      3KB

      MD5

      ce0a4d8252b9c34aa954d4ab424beb11

      SHA1

      af4d2d292dd681c35facfe9de8e327c4f8b7e32d

      SHA256

      d8261aee084c4eaa3c115f5993c35e8ac7025ca8bef209a7a30710a58ca99101

      SHA512

      f6cffed6d69951022dc887cea07c5341a58f15c623ec457797f50dff3aeb1e50b669e61e353bcaeda7db1ab8b225dba4aaec689539cae68de22a051971beaad6

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\JV5BFPFO.txt

      Filesize

      608B

      MD5

      2dea6fa7cb631accf114f45c02b319d1

      SHA1

      6decb5894ad922e69b0dad3f0da413b249a092d5

      SHA256

      e0e2c3ff355aa517decf129768d120efa441fc88fa0c97ca930f28fa2e62f988

      SHA512

      e5b9279d1ccdbe22f9bcede4be04cddbef6c515efd06082509a51f45c311b1d53cda659d20e56723d34ae5cf4e13fa8b93812ea35d4be26c971a7a293a51b1c8

    • C:\Windows\TEMP\SDIAG_a0e8000b-3f2d-4e2d-8c53-c51ac71bde5f\NetworkDiagnosticsTroubleshoot.ps1

      Filesize

      23KB

      MD5

      1d192ce36953dbb7dc7ee0d04c57ad8d

      SHA1

      7008e759cb47bf74a4ea4cd911de158ef00ace84

      SHA256

      935a231924ae5d4a017b0c99d4a5f3904ef280cea4b3f727d365283e26e8a756

      SHA512

      e864ac74e9425a6c7f1be2bbc87df9423408e16429cb61fa1de8875356226293aa07558b2fafdd5d0597254474204f5ba181f4e96c2bc754f1f414748f80a129

    • C:\Windows\TEMP\SDIAG_a0e8000b-3f2d-4e2d-8c53-c51ac71bde5f\UtilityFunctions.ps1

      Filesize

      52KB

      MD5

      2f7c3db0c268cf1cf506fe6e8aecb8a0

      SHA1

      fb35af6b329d60b0ec92e24230eafc8e12b0a9f9

      SHA256

      886a625f71e0c35e5722423ed3aa0f5bff8d120356578ab81a64de2ab73d47f3

      SHA512

      322f2b1404a59ee86c492b58d56b8a6ed6ebc9b844a8c38b7bb0b0675234a3d5cfc9f1d08c38c218070e60ce949aa5322de7a2f87f952e8e653d0ca34ff0de45

    • C:\Windows\TEMP\SDIAG_a0e8000b-3f2d-4e2d-8c53-c51ac71bde5f\UtilitySetConstants.ps1

      Filesize

      2KB

      MD5

      0c75ae5e75c3e181d13768909c8240ba

      SHA1

      288403fc4bedaacebccf4f74d3073f082ef70eb9

      SHA256

      de5c231c645d3ae1e13694284997721509f5de64ee5c96c966cdfda9e294db3f

      SHA512

      8fc944515f41a837c61a6c4e5181ca273607a89e48fbf86cf8eb8db837aed095aa04fc3043029c3b5cb3710d59abfd86f086ac198200f634bfb1a5dd0823406b

    • C:\Windows\TEMP\SDIAG_a0e8000b-3f2d-4e2d-8c53-c51ac71bde5f\en-US\LocalizationData.psd1

      Filesize

      5KB

      MD5

      dc9be0fdf9a4e01693cfb7d8a0d49054

      SHA1

      74730fd9c9bd4537fd9a353fe4eafce9fcc105e6

      SHA256

      944186cd57d6adc23a9c28fc271ed92dd56efd6f3bb7c9826f7208ea1a1db440

      SHA512

      92ad96fa6b221882a481b36ff2b7114539eb65be46ee9e3139e45b72da80aac49174155483cba6254b10fff31f0119f07cbc529b1b69c45234c7bb61766aad66

    • memory/756-60-0x000000006F4A0000-0x000000006FA4B000-memory.dmp

      Filesize

      5.7MB

    • memory/756-65-0x000000006F4A0000-0x000000006FA4B000-memory.dmp

      Filesize

      5.7MB

    • memory/2012-56-0x0000000074FA1000-0x0000000074FA3000-memory.dmp

      Filesize

      8KB

    • memory/2012-58-0x000000006FB21000-0x000000006FB23000-memory.dmp

      Filesize

      8KB