Analysis

  • max time kernel
    67s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    30/01/2023, 17:00

General

  • Target

    https://rise.articulate.com/share/brOqYgAsTijn-QPSczR7NK1BFDbYsCQ3

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://rise.articulate.com/share/brOqYgAsTijn-QPSczR7NK1BFDbYsCQ3
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1784
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1784 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1928

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

          Filesize

          61KB

          MD5

          fc4666cbca561e864e7fdf883a9e6661

          SHA1

          2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

          SHA256

          10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

          SHA512

          c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          ee5d4228554f5f10c25d842326c90735

          SHA1

          56100ee0a1fa4489cd1c83f5a05430ac4f40d02d

          SHA256

          de82f703a1ae6b80a5ace31e9b94c4a635d6235412fbdb7398a1e6546d6a2d35

          SHA512

          eaeb1e93f61b885a6650758da561ae1ebd1d08a93eba0d7ba80ebc2a3e257effd7e019cf277b579de5fb0c7ef5aeb37762f03423f4f1d2b0e13cb9528da0eb60

        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\lwrmjt1\imagestore.dat

          Filesize

          19KB

          MD5

          d27278e9fd8667c313a7d8bdbffc483b

          SHA1

          410fbb55bff0c28027b49ae87f14f310f7b6e5a2

          SHA256

          2457ef5fb09f3e845ba5dddb65b3bf76949ee6687bd4cf25152cca87179a519d

          SHA512

          dfca22d68f2eba0e2a870fb522ee7556ef7b4c99feb879eb1ce41d843189176e99cc49ac4372b952cd28c10932ca693b950c832b6c80d57ab8b82e3fea026871

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\IAYVNLD2.txt

          Filesize

          607B

          MD5

          e2261bc72c347c62967099f26fe0cb9c

          SHA1

          bd2731056425a8a368b430bb34af32ceba7aaadd

          SHA256

          e4053666690027a6055ea1c1157bd8b6ad088883bcdeff13fa50710475813fb7

          SHA512

          e0b5d5aca4944a4d1c475274e99c407fa242cf06d9c3a33a7ec0a0f75ef252ae26e4353c4c0739b02f58229d909ae827c5d07ad4d79eaca953443044375f7fd7