Resubmissions

11/01/2023, 15:26

230111-st6fyahc2v 1

11/01/2023, 15:20

230111-sq37eadd28 1

11/01/2023, 15:14

230111-smrn7sdc95 3

11/01/2023, 15:12

230111-sk7yeadc88 1

11/01/2023, 15:03

230111-sfc78shb61 1

Analysis

  • max time kernel
    144s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    11/01/2023, 15:20

General

  • Target

    https://github.com/LeandroCostaAnalistaTI/Ferramentas/blob/master/Planos/Ferramentas_UsandoRoot.sh

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://github.com/LeandroCostaAnalistaTI/Ferramentas/blob/master/Planos/Ferramentas_UsandoRoot.sh
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:840
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:840 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1212

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5e4f114c92093383bf36a643e053e49b

    SHA1

    8ca5e5b7a94ee9a016617717ce275e386435b5a7

    SHA256

    9fd471d1ca42157c06ac873ff74e3c5ad9ef62a1aecbc847fc730465bde4796d

    SHA512

    fbac49cdb899a5c87ba3cbb55b0f4c06bf3ccac87aafb5208576dfcb1f9a7a850881a88ddbe361ce7793fbcf926857963a11c8c1395e743ee3a0afaef26c49ad

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\t9o3c8r\imagestore.dat

    Filesize

    1KB

    MD5

    f1df2766b4d9da5ca9c8f2ae57afccc3

    SHA1

    2db5f74cd5f828f6739661c6be9eab1d7fbaca0e

    SHA256

    ada332315693c1bc255358f0ca61fbce04fa9794181847e54f95633f1e0d7e1a

    SHA512

    622ea18d213a6b1c2fb9bf0a897a5e32e25868829b4fd67f5e18e13bfaedf4e19ebf23c4152c3bc311d51e6b4237358770f0121c5b304059ca4402c5dc98c2a4

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\3QTHWZCB.txt

    Filesize

    600B

    MD5

    ec80b7aa4954f72d153deaba121ced0c

    SHA1

    0c57ce394ccf942f6590575be187662674965015

    SHA256

    61d18e12401d947bde7cee8b40a93f5c819dc4dd484ac4453eba6d120570b5e9

    SHA512

    b97873445476c6b8c1bdae96776aeaac2a04b55b422ed5b368735bb9bcc391edb07cfbee99a41c86f4cfe68cd2fce8aa76bb3c0be3af00f90e395f41073d006d