Resubmissions

02/02/2023, 12:45

230202-py79jsac6v 1

02/02/2023, 12:25

230202-pltwdsab8z 1

02/02/2023, 12:11

230202-pcth9sgb47 1

02/02/2023, 08:17

230202-j6qftahd9y 1

Analysis

  • max time kernel
    73s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/02/2023, 12:45

General

  • Target

    http://202cc.8170zt.cn/xudp

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 37 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http://202cc.8170zt.cn/xudp
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4568
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4568 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:3640

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    8795643bd9448f355f1e817b1beb8f13

    SHA1

    fc5afcd5dc1c57ec501109cb987bec2e7b628514

    SHA256

    c9a53a6962ee0ada77bad358699a886e9d54243a3ae24cc182acfeaef4dba134

    SHA512

    4a8bc9001359c55a68bb329ef000ea7506c003ef6a98d57d769ca020758bcde63d52b03add74e39294b7b0c52abb9a07ff6ec3bd1e66f9eca0e0675b2b9cd2f2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    404B

    MD5

    fa3739775149408d4baf1ae28da3b756

    SHA1

    74e934bc198e2292dfa6e16918bd247e46e13208

    SHA256

    8089ac5ba01cf1e8c62cb2b81702014c93883abba94f98e0c4c159546aae7395

    SHA512

    ef3710ff524cb8b580147836a8f420e873c27b67d8627a426bc1d98d36b085e3c481a4dda967d82ff69880ebf6a50193e65f35970df0dfaae34898b11b0d2fbc