Analysis

  • max time kernel
    132s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    02/02/2023, 23:52

General

  • Target

    https://www.salwyrr.com/

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://www.salwyrr.com/
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1384
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1384 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1996

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          340B

          MD5

          91ee5ab26448cdebd2f232ed2096f10b

          SHA1

          72880926bc1335bc0e1a9d953a38db46cc735202

          SHA256

          c18ac357332126343311146a2078349df538b48d077ff0db422e5738dcbb5ee6

          SHA512

          beda6677a9b10429e9c241815c63e996be6297703bb5eface532ef77fd40cb8a29ad028ee11de9e0dfb9cb3451f5709b2fedc2a0a682aa95a85f192edb5632d1

        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\lwrmjt1\imagestore.dat

          Filesize

          8KB

          MD5

          f76f1e50d69fb6c1e931ee8ac871ea58

          SHA1

          78bf8b7365ae4d0f5a82d177ec8e0cfdf696eba5

          SHA256

          7e985563442a083722f2706588f3d8aa1bb16b3771fe5e78cd5aeb3cd30497bc

          SHA512

          2d5472e4e0be04b3994c5e9f32e6b10965689e734d0a7cdaf2051a65c50c8add3a9280f31648c5b3aa7d9f3b430fbcbd9ed873823d14bb80836858c7de7a58df

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\QADHN50M.txt

          Filesize

          603B

          MD5

          5a252e6f3482c87fa1dee097f1ad1086

          SHA1

          1303bbbe8e2bbf69e95f4f9895c684295a8b8686

          SHA256

          4c5640529b74eecb80a4223a116cedc5517d89b49aef6e41727ddfc2244eba9f

          SHA512

          bf80f5fe965a61b442433493be356be3c22337851c6ec104c2add6dad15ee45154fcf7515b8a20e111fa5ee5abb2b474d9a919f4a52747edee7301fa1b58f2ad