Analysis

  • max time kernel
    194s
  • max time network
    195s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    10/01/2023, 17:43

General

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 53 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://rnccaskie.co.uk/[email protected]
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1464
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1464 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:556

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

          Filesize

          61KB

          MD5

          fc4666cbca561e864e7fdf883a9e6661

          SHA1

          2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

          SHA256

          10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

          SHA512

          c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          e5aebce9c2525523566d48de66c69eca

          SHA1

          a9a94f010b4dbb7e28224dea66c8784c93b09a08

          SHA256

          32b3291a878c1dd89562d89ffa6f85483bcaa55d33e6c0df5205b0bcac707988

          SHA512

          f76e19e167ef76e18934b7cec0d10b749e612fe40396947d0477281e2aa9b8225bfeaf998dc5c4e71ab3993a40380020c6ea7a4faf47b4200cf6dd65e267b451

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\UAB4ODYV.txt

          Filesize

          608B

          MD5

          03e3ba4cb6dd28e8a04a75cc6ab3ec47

          SHA1

          625a525945e562773e59eb7e6023372ab61c9959

          SHA256

          8956aa946069c2b8cbc04772e46da5f17a7742945a59d68f67590de90ab45786

          SHA512

          5909719b9c4b922457ecd5558c69fa937b0a728a101ca037ce1c92e23e4adea9103afea334e17b3042c1f0ea0b7bd04d91a7a2ccbdfa1de551f0caae473529ab