Analysis

  • max time kernel
    132s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    13-01-2023 14:31

General

  • Target

    http://stjohnsource.com

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 51 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http://stjohnsource.com
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1640
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1640 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1988

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    61KB

    MD5

    fc4666cbca561e864e7fdf883a9e6661

    SHA1

    2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

    SHA256

    10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

    SHA512

    c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    78f8d8984dac9685762fa581306589fd

    SHA1

    027cac4898fcfa3e05d8cdd95d1c0833322bcec2

    SHA256

    b9b7bc4efd5db96f062a6bbf4aae6a6c72e6291a21fa6dca224172d5dac8b732

    SHA512

    51beae320230e35355857e66d582946145accea7f703ee513a2117efdbdf0710bff1f76aee2b661c0ede48e57575e3944fab63e7b4f6796e785008bc28c785f1

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\tcz8fqz\imagestore.dat

    Filesize

    23KB

    MD5

    b287c1edd9f5324e9b453212d9ec6632

    SHA1

    45b894427d30d4c5998e64e7f2d3b30ac17e0de7

    SHA256

    21bb621de6781472620d68aac68d8a6a42dff1ca17e4444447f51d0c4359983d

    SHA512

    4b658fec3768d2bbfec856ff05fdbfb95e78d0db897239c42cff03b5f8e06d1238e597805784288bdc5b08818481f17438e352eea8619a5a746c1bc2168ab47f

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\40Z6IH7M.txt

    Filesize

    608B

    MD5

    6834446f03f048b31f76c2ee4e7141b1

    SHA1

    65e44194acca3e7519b002b6d30b5713dcaa7864

    SHA256

    fd1c009f36b772c8de0cf7cd75d714ce84556933ae3eb5f7f26671e08a564cf0

    SHA512

    9519ed5238efb6cc5705cb45a4b478ec5dfa501c3fa2ccf2f259851d992e2ac29e10f12f59d1dcf16ff49bc73419910edd34239ebbfb6bb0dd54427de08078cf