Analysis

  • max time kernel
    80s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/01/2023, 09:50

General

  • Target

    http://cargozwoa.ru

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 35 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http://cargozwoa.ru
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:5028
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5028 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:4340

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    03c43ce055f8989a6508481c8acb6608

    SHA1

    3dc33276158435396c4272531a62707a18a4a875

    SHA256

    1e977bad400e43c86966889b895bbf3b00b929b4bf497c791ad0ed2a0749fd3e

    SHA512

    fb69a674b2c2aa697a7c1fc94490298949831762d9d9612266314727ea85f84035df089f62e1aec24474caa1fc52fc94ea704d161335d37c1cf746c72af1f8ab

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\82CB34DD3343FE727DF8890D352E0D8F

    Filesize

    7KB

    MD5

    d4c483702015279d9261ec61a514312b

    SHA1

    93dbff82bdd49347628790a552525388c7ce8071

    SHA256

    24100401596b79390d3184b2cda413aedfadfec39ce7355c1742cd52144cd32b

    SHA512

    792a608a294f2af4dca7350ba83764544f15d5d922776c14b419efd9aaa476f9d3ae2aec89532f4ef132e86ea012dd02bab52ecad19a0be34ff698abbe3b6d1a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    434B

    MD5

    e8b53a31cfaef06af1fd3097192434fe

    SHA1

    f78f40d20846518fc06d6cc7d5a6d39aa2dc8734

    SHA256

    faf5a256cbd7639fefab84bd1fcda8d6cf35afa98c99a43da20a634623388d81

    SHA512

    7d57785eab6cf0fdef9810974e53e83f055e1630d9c2a7e85d57791fbc2191ec270d8088b84c613651988b24a61d5e740f9909bc3b6431718259fbd18748be2d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\82CB34DD3343FE727DF8890D352E0D8F

    Filesize

    232B

    MD5

    5eec21700d1a23affbe9437ac2bde1be

    SHA1

    7e9bc1f809a2ebeb5ac48f7cac710049889e8e5a

    SHA256

    6db4d85cf9d1bcd009b8b0a3894df7c6945d1f8897f283c3bf99034a04ec09ba

    SHA512

    e972fb324245cb3688894f922ec2ae9c55924ddb845042a83ffecb24b3cf83a799b77d85a12d1e2bab15236b413b2df34f1c5b45d33933ea2b0ff17f805adf39