Analysis

  • max time kernel
    88s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/02/2023, 02:52

General

  • Target

    https://34.75.2o2.lol/XVlhoMVlWVlZOVk5sVVVVeldISkxWRTUwV0dzMGFFSlhMelpoTWpSMmMydEZNWGwzWnpac1lXMWFSak5PVG1kd2IwNXBWM05hYkdOamNqUmpkRFJETTJvd09GUmxUMDl1VURkcFQxcHhWalZJWldsREwwRjJVRTFDY0hsb01qUjRZWGd3Y1VsRFZGZHVUbmxNZEdSTlYzRlVaMW8zU1VRcmRIaEhTakpUTjJScVpqRTJURk5RY1hwSWRsQlJZWFl3VEVobUsxRTJVRk16TDFwUlRtVldNVEp4VW0xMU1rTlJMMnhuUFMwdFVrbEhPR3h1UWl0bVVFNHdOalZYYlRSU1JVaFlaejA5LS0yNjcyZWNiZDcwNzBiYjgzNWFlMzQ1ZWUxNjBlYmEzZGJkZTY5Njhj?cid=1461954900

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 41 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://34.75.2o2.lol/XVlhoMVlWVlZOVk5sVVVVeldISkxWRTUwV0dzMGFFSlhMelpoTWpSMmMydEZNWGwzWnpac1lXMWFSak5PVG1kd2IwNXBWM05hYkdOamNqUmpkRFJETTJvd09GUmxUMDl1VURkcFQxcHhWalZJWldsREwwRjJVRTFDY0hsb01qUjRZWGd3Y1VsRFZGZHVUbmxNZEdSTlYzRlVaMW8zU1VRcmRIaEhTakpUTjJScVpqRTJURk5RY1hwSWRsQlJZWFl3VEVobUsxRTJVRk16TDFwUlRtVldNVEp4VW0xMU1rTlJMMnhuUFMwdFVrbEhPR3h1UWl0bVVFNHdOalZYYlRSU1JVaFlaejA5LS0yNjcyZWNiZDcwNzBiYjgzNWFlMzQ1ZWUxNjBlYmEzZGJkZTY5Njhj?cid=1461954900
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4664
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4664 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:4944

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

          Filesize

          471B

          MD5

          aee722fcdc90fcfba473126bf8bed12b

          SHA1

          df62a695b671a248b19f76cd6d420d1bcee9c27d

          SHA256

          e759250bcfe36a1a745bc1cc241dea84b6c791141e93b322bd5027d62d3a4807

          SHA512

          e51c09b66f06f247289841147cc6ebf2b70308cfac2c500915ed2b4775813e48422e60779e50351ac668bab548afaccb822a1486ae8242bc37697f16f3a994cf

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

          Filesize

          404B

          MD5

          0715b31255cf5279ea54d66e6bc73f04

          SHA1

          899132279f686e69ad9cc0b08ccc27a71bb35849

          SHA256

          d7dae7c15033e17915210e6adf019890312887d849ec949998844d667dafb30b

          SHA512

          5ebd963d3a4f95b63e4cc7bac18aaf1dcbc601a7885d977ff6c9132692ea2122498259bee5bbd96b8ee96db91c9c9d1e8642027317e2360ca7d3c762fd6f80bb