Analysis

  • max time kernel
    46s
  • max time network
    49s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    08/02/2023, 17:05

General

  • Target

    http://myujjain.com/pytpkhq.php?nk5&Deborah_Huggins

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http://myujjain.com/pytpkhq.php?nk5&Deborah_Huggins
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1680
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1680 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:848

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\tcz8fqz\imagestore.dat

    Filesize

    8KB

    MD5

    6ac2d2cdc90a606dd8e1a792eebfe8e3

    SHA1

    c979a046a55aca855b2218a9a26c8e03aaf328ce

    SHA256

    78777edbae1a1d2c6af35d9988d90cdf6a78380a9258926b9e1ba6d279b6df53

    SHA512

    f92da881ef9583f0b1707da929748d3379da1006ffba3cce1294e464c8d76ad4e034202c3c0fa86c2f1e47e205fed26a58f14b48cf3aea12bff813697ccc29d6