Analysis

  • max time kernel
    132s
  • max time network
    180s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    10-02-2023 15:10

General

  • Target

    http://us.content.exclaimer.net/?url=https://boglebuilders.com//opp/oppp/Impact-handling/matthew.hawkins@impact-handling.com

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http://us.content.exclaimer.net/?url=https://boglebuilders.com//opp/oppp/Impact-handling/matthew.hawkins@impact-handling.com
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1532
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1532 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:944

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\82CB34DD3343FE727DF8890D352E0D8F
    Filesize

    7KB

    MD5

    60b9eee18f0318ba56e33c41a80e4620

    SHA1

    94f75712bf7ea18e42d6eb3edd188bd5107bffa5

    SHA256

    b3897abdc308eb2f09af2f1146576875f8592116abe59b487eca11be14a147a3

    SHA512

    be4786c122ea9fb34cc641ac46150a3e2474a2110a94d3eda46efd4a3948350a10bf60faf5f9395c880efda418a399bc892d07289e2d0013155738225095aa35

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\82CB34DD3343FE727DF8890D352E0D8F
    Filesize

    232B

    MD5

    b9b9fde9c804d0a3cf2f4dce8a54bcff

    SHA1

    39985e1bcbd6c69763e8eb4f594850bdc63da61f

    SHA256

    a1ec5ab0569f4bffee4fb74c31f1027e6e02f7e3e88dbbed4dc5dba8a7201c88

    SHA512

    5f7db9d60ee60649297e5fe6a85bbddcaced587ed1bf11cdabdba67ac2e6e1d16fd68cd409485027e9088a967ab0c4437e92b518548b5190fc498da12af77a3a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    340B

    MD5

    22693e51af633b27fd4fe61cedb6ed23

    SHA1

    d945b85fe0da2094606893646896c25b1b08bc36

    SHA256

    f674dc3be08ec740a12edb12743a4e25b5a7c2b05ece63961c86873e1c84ecaa

    SHA512

    a0e9dfc55f735a4adf1442377861e2fb8fa60a0cf9a80ef4da34bdabf3897d5c912c14c02dbb03522e77e66cfac0aae7ad76d28f58724f2546629920485966fd

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\HKKN99IY.txt
    Filesize

    608B

    MD5

    d90e6c2bdbb1c1027bd8435af58d103b

    SHA1

    247f54730ec0903c5c54c5739d8cf05d6b6c3ee2

    SHA256

    eb5e706b222f056c6b5e9b179c0c0f71e0cc2f4ec0960a3792be6d9275bbe1aa

    SHA512

    2286d1553a931f858e0f77905767ee1a5147d068411acc2974cc21d1a71156386429692b08a4b0960375c868e5cd6338d88a3e6c83e31a36b0474024005b2f5a