Analysis

  • max time kernel
    113s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/01/2023, 07:02

General

  • Target

    http://6/8b2d4658da988296b8342b6a5da4c57a45a574100136022802300343d3c0b53ae402439cff7860562ae174b99db2680013602280230034dcac1edbecd628084db847fe94f2774c4fcc08430136022802300346b2b41a4cd7d022e0faa5dd8d31f88425be77a7d013602280230034/remkus?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EacoybST-4HpC-TI2g-p1BC-FKd1zwWsCZRV_EuGDzmFwLSAtT2eWOPcoU0ZdN4pMaRfQngJVb6Yh1riB5xsI3ys6FrwR5Q2uk3TdiLKOB04H8CMmEaYJ9bqopVfjeAcXhIStgP7W1w7jeGCrIstnQoYUuHa6JN5Ec8XlApb0mkLMz9yTBSW4hOxKvf&data=c3VyYWouZ2Fpa3dhZEBoaXRhY2hpZW5lcmd5LmNvbQ==&isok=y

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http://6/8b2d4658da988296b8342b6a5da4c57a45a574100136022802300343d3c0b53ae402439cff7860562ae174b99db2680013602280230034dcac1edbecd628084db847fe94f2774c4fcc08430136022802300346b2b41a4cd7d022e0faa5dd8d31f88425be77a7d013602280230034/remkus?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EacoybST-4HpC-TI2g-p1BC-FKd1zwWsCZRV_EuGDzmFwLSAtT2eWOPcoU0ZdN4pMaRfQngJVb6Yh1riB5xsI3ys6FrwR5Q2uk3TdiLKOB04H8CMmEaYJ9bqopVfjeAcXhIStgP7W1w7jeGCrIstnQoYUuHa6JN5Ec8XlApb0mkLMz9yTBSW4hOxKvf&data=c3VyYWouZ2Fpa3dhZEBoaXRhY2hpZW5lcmd5LmNvbQ==&isok=y
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4668
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4668 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2192

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

          Filesize

          471B

          MD5

          c095652a90450f6e9ed5dbdcb1f7e807

          SHA1

          e751b539a52150785c0740d444aa759331b985aa

          SHA256

          7dc466e98f2432c283d67159d100a79c1440e6fd132a9b8aa493cc26f8ff1181

          SHA512

          aa00b805ac890c08dc5eb6cd2cd78385e1b0f4228f1ec1466bf6c203ba3359710539f78a11bca7421e55ad55e6eedafbcefbaecfe7345b56b4beffe6ff57875a

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

          Filesize

          404B

          MD5

          4478752ea6b03a6be1f5cd2e0faca16c

          SHA1

          75d7182a1561790f745328567b4075181f00ae80

          SHA256

          970c20fb3bfda055d418bc2a4f59c654e50eb65fe16af4aa278f9bc2bf447a6a

          SHA512

          8f7872619495536588c7e896f9a9ddecfc93ca71b6e1d8da72b326d04c006c67038b4cc875ff78c49568f2b82f8b66200451a17027628020ffa062b3b2d5ec8b