Analysis

  • max time kernel
    66s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    15-01-2023 01:35

General

  • Target

    https://cdn.discordapp.com/attachments/946235692512579614/1063305513896521808/CRYPT_CLIENT__SSVERIFY.BAR.zip

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 30 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://cdn.discordapp.com/attachments/946235692512579614/1063305513896521808/CRYPT_CLIENT__SSVERIFY.BAR.zip
    1⤵
    • Modifies Internet Explorer Phishing Filter
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1580
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1580 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1716

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    61KB

    MD5

    fc4666cbca561e864e7fdf883a9e6661

    SHA1

    2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

    SHA256

    10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

    SHA512

    c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ca60c8c52c0420f35136ce077e5fbf7b

    SHA1

    1610ef59b990ac3509903e50ba0c655fcc48149a

    SHA256

    592cf83904ed0474657a53b39153e5063a0caad816f0b1e600d8141d66f0d031

    SHA512

    0632f8a104ec1f09bc12888b3072b593c1601526b8208caab0937997a3d6bd7f4403fb16329cbddae4d380f85d1f1358832cca59c4ab35043bdc6b6692b53f08

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\7JX1HC5Z.txt

    Filesize

    601B

    MD5

    ac0b68e14ab1cde0bc6aad4c31980a16

    SHA1

    6604cb19bd85fc42a006ab0733101a137ad02712

    SHA256

    0395f1083dbd1a14ad4efdf63a6c16897170037a2b221c80782675b16e0c662c

    SHA512

    78cead83b9e4c818b5dde9c5c0610213c8aba4fad1c57a6f9843ec536a674113c2083e9cf1cfdd4d2aa59f8795a38a97f3f962b242cf6b6c1179ac52c9b4e796