Analysis

  • max time kernel
    187s
  • max time network
    191s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/02/2023, 05:56

General

  • Target

    http:///root/sample/0090faa5e9ce72d856bed989b2a1c99f9077118b

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 37 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http:///root/sample/0090faa5e9ce72d856bed989b2a1c99f9077118b
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4884
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4884 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:5048

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157

    Filesize

    4KB

    MD5

    f7dcb24540769805e5bb30d193944dce

    SHA1

    e26c583c562293356794937d9e2e6155d15449ee

    SHA256

    6b88c6ac55bbd6fea0ebe5a760d1ad2cfce251c59d0151a1400701cb927e36ea

    SHA512

    cb5ad678b0ef642bf492f32079fe77e8be20c02de267f04b545df346b25f3e4eb98bb568c4c2c483bb88f7d1826863cb515b570d620766e52476c8ee2931ea94

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    54d6253214f843b2b958ccc313c9d824

    SHA1

    6458fc1969c53f40b83d11149811cc0acf952a12

    SHA256

    9452ca2937559277d5c065011cc3f080eab643950189b27605bca71c12e6f10d

    SHA512

    be04dfda0020d0d907e1f0f0ddc86d4793a27029ac950524333aa37defae511a739af51bf77e51a742f50d73dc03b33771d417b69ea0272da0f02f233f665d52

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157

    Filesize

    340B

    MD5

    2f1f1bc448afd7297ba8bde32d74d32a

    SHA1

    6a7d2667672ad851dd931798b88d64f905bb8701

    SHA256

    b1308a3b0aa81d6c6be076fa69eb0afab29d0b210124a8133c17bef71b4fefe2

    SHA512

    3b78aaeb5640c4d7dda1e43d95ae701225716d90190d902675e6da7a62eb5d405a43d4c451c7714a88402dff160937c1c9aa76cb0bdfce61499acf9b1fd4a845

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    404B

    MD5

    593cda3e25cc22ff23f281343fea4350

    SHA1

    288a5aeba6ae396914b14504d0cf0f4ab590600f

    SHA256

    f3c4f2300fdc7e30c7b44293104fa737ae85c997562eb3234546c6094ea6fb43

    SHA512

    727afe9ad3650028f74124d6b5aa67a2f183863d1df27c3480ac943281983a47286540316fb1866ba1b7db6264060bd5144341f5248011781f1e83ffa14d379b