Resubmissions

30/01/2023, 15:37

230130-s2fkgsah57 1

30/01/2023, 15:22

230130-sry9vace6v 1

Analysis

  • max time kernel
    67s
  • max time network
    72s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    30/01/2023, 15:22

General

  • Target

    http://ap.lijit.com

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http://ap.lijit.com
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2028
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2028 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1644

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    61KB

    MD5

    fc4666cbca561e864e7fdf883a9e6661

    SHA1

    2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

    SHA256

    10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

    SHA512

    c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3a2a18c549100dff4a3f7a39f662ae76

    SHA1

    1352ea4c108a4eba0d1434e82c042b332f653196

    SHA256

    d677ff1fc6ea72dfe77ee7289ea1b237e59c4496b34568d4df093cf512a2357b

    SHA512

    b7d001136ed01665a83704de9868237dbe3fc34382870ba707c5575ec806c5dac4cb58f1a71d904bab3e8a35584a72f6163ef02724e48fca92616b00f25b4789

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\JVX1I26G.txt

    Filesize

    601B

    MD5

    48f8cd9f72b3e864892a14bff5658a42

    SHA1

    46c5cf12f42ab2413606862bff2e520aafb82f74

    SHA256

    7148717910f0f3d5645864839c965fc9974e851d28b4bd0a369dda7f9665fd54

    SHA512

    2a760cc5a2368087faf7d3e0097eaddfe426809094f91d605d76fbfd0b27f434063e7a342ef6993ce93e2ca0ee8ccb800ea5aa90a5bdf0c845217231b5360759