Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    31/01/2023, 01:04

General

  • Target

    https://apkpure.com/foxtel-go/au.com.foxtel.Go

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://apkpure.com/foxtel-go/au.com.foxtel.Go
    1⤵
    • Modifies Internet Explorer Phishing Filter
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:368
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:368 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1076

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

          Filesize

          1KB

          MD5

          a266bb7dcc38a562631361bbf61dd11b

          SHA1

          3b1efd3a66ea28b16697394703a72ca340a05bd5

          SHA256

          df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

          SHA512

          0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          340B

          MD5

          f3b939e218e59bcbea3501ee346fdb8f

          SHA1

          ce695825e6db2fba8f6661ba3138d66d2b1f7e5e

          SHA256

          28355f5d2953594201add72a13a687adf52e19a28ac8bf965f14ad03213c4848

          SHA512

          b2c4f2872aa0ff3b8cccacc1c21709bf682fc7add02615cd8552b3c40028326fdc503c955034975db9b176c25f5cef62a947106398b01ae15055daf64fd20fde

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

          Filesize

          242B

          MD5

          4b7d78cf2fe31a0329bbc852c59999af

          SHA1

          df2b47c8e4f7bf49cf5e983d12c94b760e3f2012

          SHA256

          02142f9c87bde91ffadc7ae73540024b07f6b8c7036d0f3008d40d4518d107e5

          SHA512

          cf0722f70ff1993c9a0487d80b0d7f11acf71386733bdf3b3b17e9f9b456ecebb1d57ecbfe5af5f5cd2f4db1073556c19940d3ea6772b8c00aa8e37c1aed040c

        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\1evexod\imagestore.dat

          Filesize

          36KB

          MD5

          c9f4d2ec1a00b286c123dc6f8e8564da

          SHA1

          61495e248cde0143dc11ac9b8dc580c0fc7ac709

          SHA256

          f9217f5d265eb1459fcd8ff3a56f44b0002e75df7a863684792788eb8f7dc59c

          SHA512

          06abf4bf7fb3bdae59131609de961dec5d676488f094bb8a164f2db7a2daaf803468cd4a9a3a1948bd985f6df6b009c0647aa96b410066bc4d22c2344515e501

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\AIOWD1BB.txt

          Filesize

          602B

          MD5

          b0d59be2bab9af15631616311e52734e

          SHA1

          26a2ea0014edc3f7d2d570c126b1a626184609f7

          SHA256

          313f16066c9cbd12402fe1322779ae40d1f86d3578be58bab18e6636cb997c7f

          SHA512

          e08868492f594a44f2d0470f034a400935287dd5028ad45483856d74dd8cf75b34b4ae3e1d95430811458c00c57a5a793cb8f9e13e5a5808d54d782f382f328c