Resubmissions

07/01/2023, 19:21

230107-x2pwdaed79 8

07/01/2023, 19:17

230107-xzle6sed69 1

Analysis

  • max time kernel
    73s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/01/2023, 19:17

General

  • Target

    https://www.mediafire.com/file/sfd6m7a086ro8bq/COUNTER+STRIKE+1.6.exe/file

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://www.mediafire.com/file/sfd6m7a086ro8bq/COUNTER+STRIKE+1.6.exe/file
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:432
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:432 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:4616

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    a84659e00d09b65942dd6319948f4b09

    SHA1

    5019ed50b4dc83eb14ee8f741b7fb78b0cd32483

    SHA256

    5883ea503ab00c9fa511bb6ba9f0367ef9e37951f681ed647d76e61646946708

    SHA512

    974b291e90ddf2bea9436bfb1ba6649530a29d1611885fc909e41a99f47211414c9cb86d13cbd30229274da1ca35533ad0da2c695499df77036cfe0b096ca404

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    434B

    MD5

    4bf07c410fec9b565303cfe0fcad5aad

    SHA1

    3296254bc6ed0222ca634cf72c91bdfd7ccefa0d

    SHA256

    beb06f02eafe51b99ae4a0ceb8f81f5620ceba59bb969aac824d89d780e72a4d

    SHA512

    f75de255e3ea76f684724762ec6e9b4b9a707964612e8ea2355932cf80ee571beaf5cdd0c7be69c0e59f77b4c04da20f096176740c2ce12a502c49b743d8e71e

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\xyoggsx\imagestore.dat

    Filesize

    11KB

    MD5

    6af35bbf3ee3ddff98e934732451d7c5

    SHA1

    1e995cc4d25567864345507be7c30c0fb86c42b9

    SHA256

    f93aa6bcfa098e63b988ed2bbc471474235f377183d7835afbdf42b979405c1b

    SHA512

    ad151ae8ae98380791f046c6dcd7557a421090c324a08f303e29413fcc2d696476471bbe5f7e3e7e58dd2dea789e30811a2315a54ac99afaf9c3692c83de8046