Analysis

  • max time kernel
    115s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    07/02/2023, 00:56

General

  • Target

    https://www.escobarmerch.com

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 52 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://www.escobarmerch.com
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1132
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1132 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2032

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

          Filesize

          61KB

          MD5

          fc4666cbca561e864e7fdf883a9e6661

          SHA1

          2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

          SHA256

          10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

          SHA512

          c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

          Filesize

          1KB

          MD5

          a266bb7dcc38a562631361bbf61dd11b

          SHA1

          3b1efd3a66ea28b16697394703a72ca340a05bd5

          SHA256

          df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

          SHA512

          0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          92cceadc62471cb50584ad948dd8360f

          SHA1

          6e9ea6a9c772ad4ed79088ca55becf2bb025f193

          SHA256

          4adc26b56c178e6cfd4ab3feeb95469cfe2ca27d39ed38af741e4ecdacfa90d2

          SHA512

          9b0357716e64f8e350af8037404323152a742575578cd0f378baeaa8fce0e7d839f2467a42033fbb2a4168f9433a5425dcebf59b850048288b15583a723c4bef

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

          Filesize

          242B

          MD5

          6a263c5f5230d89c5bac4427eaf2dd94

          SHA1

          de07e480b2faa9f31d6f5dbfc4edeea07faf17af

          SHA256

          90fcf049928e32d27bfe642995f3e5ecfdf59b5b1a6ab39fbb9ff6f21953c848

          SHA512

          2501b6f59e21b19d4f89ffdb4dcfbe944f2cbf3f26b28ab8119844f1b3da194fae2ceaf07f58b8b4e982f7d6f6591b0ffd457dbc5be0245d0a4758c6acb607de

        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\tcz8fqz\imagestore.dat

          Filesize

          6KB

          MD5

          cbe2dc3050e63a3d0c2e5c0a8391042a

          SHA1

          64f62e93502f50f8a3b578ad5ef5782261477c1b

          SHA256

          78fcef9050d173811640d829b9e0731077a4f712c1e06f4c7ffd82ed18325e61

          SHA512

          7f8b19b444ae76407f66f3a11884b469198f45c8ab32107e50e324ca2efcedadb9118059fda7057d6092319d8c8075f698b4943f2e2248af160d26d9385367df

        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\tcz8fqz\imagestore.dat

          Filesize

          6KB

          MD5

          0c66246239d12f8e81a0bb1077a33fde

          SHA1

          2a3fa6178c2480d45fa228ffa08a4cc4e9f2c98d

          SHA256

          5d39c08001a9a6cf426cdb5450dcc4d5b61452f97d32f6e6cbd9040d017fe1b0

          SHA512

          c4c24b2588b87dd9cfa6a7204af4435053acf5f815cd1a4521d9bf0154410d103c8f07454cb5d1c1b0cc09f72a6320e313b2116cd2a3c841a0f974d58ca49f41

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\3NGVMGVD.txt

          Filesize

          608B

          MD5

          4fe27b7cb22fa1eac7e1229e50cc97ae

          SHA1

          9801bfeab41e5005e8e6cc55b3cbc5df32cb2337

          SHA256

          7abd4170ee1b180641762afa37edc31c5275be856d71c6b88edbcd665a44c82e

          SHA512

          d3789fecd55c2edd48a024f1648a57f4f920384c89a3ef543cf0bcde84d0d4fee6af8932a95bfa3a059604cd2ebf6d3e93a75636c21012b9b4afa4845a429768