Analysis

  • max time kernel
    123s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    13-01-2023 21:40

General

  • Target

    https://www.facebook.com/profile.php?id=100064423974675

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://www.facebook.com/profile.php?id=100064423974675
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1832
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1832 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2036

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    61KB

    MD5

    fc4666cbca561e864e7fdf883a9e6661

    SHA1

    2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

    SHA256

    10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

    SHA512

    c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1dc881c810959e9c0e84ba30ad99d4b3

    SHA1

    99eb428e24780ffd57c342ac6d955125a1824d9e

    SHA256

    660f55d0d7d2faeb9e394d959f1827c2ecae9fdb42960d838249b91accf7a4e9

    SHA512

    d45a9998b2bd89a95001e03530e5c822d2fbf17661ee87ec1f21b9e701095e5f3cfdbb70d98e875277911fc68d9036eaf3a21a2615774add19e8e59ac8eaa70e

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\lwrmjt1\imagestore.dat

    Filesize

    11KB

    MD5

    dd15051060c0cc5264aec0e8bc85bedd

    SHA1

    bbbe8470e77686553e877aac805b2fecf23dbc6f

    SHA256

    2a6880a375ac3aa5a2dc4b5d11c8755380cb0646a6ce731a193b5f9db9da455d

    SHA512

    d659d890dbeab65433870ccba1e74fce2449e5de8e75752a174b42a69f8725ca653935039d4ab87a2869b2a4d1c1fd34e84d717aacd160d4398899478f4a6e09

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\NYQ414EI.txt

    Filesize

    608B

    MD5

    e333bd4833d6b7a143388c23422db3de

    SHA1

    c21f18d65b9917147797e21a4ffaabc216418e43

    SHA256

    e0e187a438f70e45b74e02e6a57b166b99ee4b49715aa16e7e113c02e41af984

    SHA512

    2461fc77335150df60964578b5ac1a9e6bfc1dc862e99f2911b7d87e30720d71ff334aa927386b7c9f48ed14a563b86bfb07a5a80a14bfa281fa1a33803a0e93