Analysis

  • max time kernel
    67s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    25-01-2023 11:35

General

  • Target

    http://depot.mountspace.com

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http://depot.mountspace.com
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1720
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1720 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:772

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
    Filesize

    61KB

    MD5

    fc4666cbca561e864e7fdf883a9e6661

    SHA1

    2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

    SHA256

    10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

    SHA512

    c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    2873b6fd3a552b598b50ffcc7d40192a

    SHA1

    a4a248adab3abcfb054fb86b5ded6aba243361d6

    SHA256

    3c40b6178fbf156e23e3a343567bd4a5f86d9829a01be1427326ee241aedd3f1

    SHA512

    32632ce09a2b6a3cb8f72c848a4222f7b7e26f1f3082d1b1b11720dc33dbebff8cf06c3d92587b7e0c64db99aa6e1306614a018917e42bed8fa9257b74d17f46

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\t9o3c8r\imagestore.dat
    Filesize

    126KB

    MD5

    15eac5c08a01d192dddcf1cb23f0ac35

    SHA1

    2f9c8ad00afe8446e3380e0f9b7e5bef2475bfde

    SHA256

    a2f46cede578cb5a8746cebe004781ac99d4e3e6f51ebb925decacec1ca351b9

    SHA512

    936a00a6475e22b675e85b1de24b8f6f88daedc448e137608130ed8ccdadce90e09fa890caaa9f183d0a35645e21c8f3ed482c062c949bcdd03c0d47ae2f7d54

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\7DAW21E8.txt
    Filesize

    608B

    MD5

    054944138a43dd9e30e95233e1056125

    SHA1

    1598e13c4485b717dd446474c8024ea662f04d9d

    SHA256

    5721ce4eb39166e61afcf5a2f5879356e71de7135eb4b8eafb9020d917c25d05

    SHA512

    941eb17b3132e975fa9ae9a39b8115c3334f59327e275654e20df138131ce4eceddcfa81ef9c25f36240ca90944be5aea14654de7c665e5229ed6feb7da54fac