Resubmissions

11-01-2023 13:00

230111-p826aacd87 1

11-01-2023 12:34

230111-pr3qgsca47 10

Analysis

  • max time kernel
    132s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    11-01-2023 13:00

General

  • Target

    http://steamunlocked.net

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 40 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 14 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http://steamunlocked.net
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:364
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:364 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1436
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:364 CREDAT:668698 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1064
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:364 CREDAT:930827 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1704

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    340B

    MD5

    2a27ba351e528032e7f37f4bf6bf0d1c

    SHA1

    a41620494248ddf66d61fd8f7cff920fa90cd35b

    SHA256

    ec7967657262ff9f3f23a99056a2b6ae861abeba1931271fbde49cf924bae5d9

    SHA512

    69f1df546442581824dcda7f774ea8a03c1d95aa5c76f63ee181faaafe860a3e7bf352baded64ae399f5e8f532f7bd9c30b062a95041c6f7c3212b1ba6a0d77d

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\lwrmjt1\imagestore.dat

    Filesize

    5KB

    MD5

    78faab8bcf8b835db7299e300e629005

    SHA1

    e479c3af558b20203f23ff6b6766e29e4ddd4bdf

    SHA256

    2b0bb58b64bfdc237d3ee6a060e734dce26dea657e074d995da76a5a32973c8d

    SHA512

    db73fb4aada77023bffc866d5856f0fffbfdaaddb30c4c668a40c3830c499eb24259da078e638834d852886ad6d60df8201a14207e9bf7dedb603a03a01a68de

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\RH8AD4WJ.txt

    Filesize

    608B

    MD5

    52fce3ea8b7217da5ccb022a8df0811d

    SHA1

    2f985ea20580fb49334ea336d29184645ade4460

    SHA256

    30dadd53130ae9a279015ebf9039f83d632a55c1b453a89c6cc870415ccd2c47

    SHA512

    a1271c5ebe657ef67a0ea5c09ffd037e8427380b2ee6d8e2fd11aa65bd6cccc936d95c1c4261e2f0d64e8254f2f8b53efa028df57e257bdd2f34f50edc35b66c