Analysis

  • max time kernel
    105s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-01-2023 17:19

General

  • Target

    https://github.com/patrykq9/Metamask-Arbitrage-Trading-Bot/blob/main/setup.exe

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 41 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://github.com/patrykq9/Metamask-Arbitrage-Trading-Bot/blob/main/setup.exe
    1⤵
    • Modifies Internet Explorer Phishing Filter
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4856
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4856 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:4924
    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\E3KT0FLH\setup.exe
      "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\E3KT0FLH\setup.exe"
      2⤵
      • Executes dropped EXE
      PID:4620

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    2edb0497a0b1af9ce4fd1678e28d33ca

    SHA1

    a187a6aa5d6a6adaf84d883d45393d3467a969a1

    SHA256

    ef88897d83afa3568fd2b4d8e4c3dbebf153081b157b16074a8ed0737411e5bb

    SHA512

    fb929af42c1a5438a5008b67953230b3864875af25529f12bce1c4f7c4ce467e66a35ff18be15f1a0db9c81ab5f2dc6f45cc0a0b7d9199c4e9c1274557256d31

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    434B

    MD5

    d68eefb5d15c93f269109daf13f95e09

    SHA1

    2fe5d52e09478cd4d53cc4d67c4d1d424a0878ec

    SHA256

    c6058e93162194d19dd6f2054c0d224c6c91dc19ea314608d7b293e9b8927e76

    SHA512

    34306a60c53c80b35e7f816f540b9ef236582ca926bd600adf76394ef74eff0d2a53a24bb7b7cb87a419a3fc8b21afb06f7477de7768c4b223c71066bb10d857

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\xyoggsx\imagestore.dat

    Filesize

    1KB

    MD5

    2d8e0433f3667bce4ed4c603f197204a

    SHA1

    5f9b0d79377d91b2bd9ef19f23f574ded173f62b

    SHA256

    72dc24649dba765056c00e1e4aaf3c62a18a2c143efade2bd81fb0c6b509fec9

    SHA512

    692ee78d5b6856d0b32cd6c87fd4b998fce3aae8a63ce1bbf2908aaca611315d5863851aa595c4f01e5ff287bfb9d5ab9a221cc9801dd9f1b7eda8c5afa0cae7

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\E3KT0FLH\setup.exe

    Filesize

    3.8MB

    MD5

    cdfe1df11ea71c1b9bc1b865a8b90960

    SHA1

    d300c5a7d8e3722513707ae5b82201db231334c9

    SHA256

    a334e628d5daf5fbce24680d8db0f7f86963ca62922657c5d1b271ef414285a2

    SHA512

    e3eee96b51031b1d133c71a13a2ee4945764f82376ab061d6e85feb6f61a5d52c52c0a82fdb9dea9298279da9e864de9df1a975a380e2583a6c9efb3fcdbc24f

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\E3KT0FLH\setup.exe.du82gs5.partial

    Filesize

    3.8MB

    MD5

    cdfe1df11ea71c1b9bc1b865a8b90960

    SHA1

    d300c5a7d8e3722513707ae5b82201db231334c9

    SHA256

    a334e628d5daf5fbce24680d8db0f7f86963ca62922657c5d1b271ef414285a2

    SHA512

    e3eee96b51031b1d133c71a13a2ee4945764f82376ab061d6e85feb6f61a5d52c52c0a82fdb9dea9298279da9e864de9df1a975a380e2583a6c9efb3fcdbc24f

  • memory/4620-134-0x0000000000000000-mapping.dmp