Analysis

  • max time kernel
    143s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-02-2023 22:42

General

  • Target

    https://pelisflix2.biz

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 47 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://pelisflix2.biz
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4244
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4244 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:4056

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    8795643bd9448f355f1e817b1beb8f13

    SHA1

    fc5afcd5dc1c57ec501109cb987bec2e7b628514

    SHA256

    c9a53a6962ee0ada77bad358699a886e9d54243a3ae24cc182acfeaef4dba134

    SHA512

    4a8bc9001359c55a68bb329ef000ea7506c003ef6a98d57d769ca020758bcde63d52b03add74e39294b7b0c52abb9a07ff6ec3bd1e66f9eca0e0675b2b9cd2f2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\82CB34DD3343FE727DF8890D352E0D8F

    Filesize

    7KB

    MD5

    2968bcd90aad32d12807327e658ee03e

    SHA1

    3c8f0451b90f22796b9d751cb12ab79b841d07d2

    SHA256

    c80150fe8977ac2587cbbdb4156835a2d3b57e87f6d40966659f785f16abd64f

    SHA512

    58d00c85e796bace1c47c86df71e589972583a14a4749a8195341aca7cc560a74abafd7246fb754c4c885a5a7c8509dd53c36a5a3f23f346621bbc11f08cd66e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    404B

    MD5

    c031850b4022a8e186b897c7db48dd5b

    SHA1

    52d5836c2bda6b28bead02b25ae9f0aef573ed7b

    SHA256

    39f976b3e310364d531c040337b851df617fe69c5986d52f699ded4a577813b7

    SHA512

    95cddd726fd9ebee11305fbdc920e585e8bf88610f7c928eee7f150900b472ab22dd3f1946d11cd1147f8c39eb6519d83d49ce593c14740a4930bbcea7f9a6c6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\82CB34DD3343FE727DF8890D352E0D8F

    Filesize

    232B

    MD5

    43d62a92c09f61ac7da3622c090ffc48

    SHA1

    0030d2fe9c86d66e6d14b91b6098e0546b05fdc2

    SHA256

    1a32ebeeb2d3f9a084a6a3a73c20487106f5c840742c52cbbae16b3c474f88a1

    SHA512

    d2220ea1648618513478eadeecccfbbc4719d79531b017731f1fdb7bb8119a8242bfb78be4232892c2d13b4a0dd1a9ec443c440736baaf947fb9d98a6e2b27c7

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\dqptnfu\imagestore.dat

    Filesize

    1KB

    MD5

    84db816009837bba49bf0337cc60ad2d

    SHA1

    3b5526ef67c1d2692eab70122f2293e165e2571c

    SHA256

    07d6c547f43c4d192cfc28ca41a486d4ece10dbfbf933cdf648def972c25cd88

    SHA512

    20655bf129f8e4ebcab22ea7478b65917826faa11b256bc1f304077c28ea416dfc46ae382f2469848aef83a7da0dd9400bfce2c488a448cab907238fccc0bddd