Analysis

  • max time kernel
    1817s
  • max time network
    1587s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/02/2023, 12:23

General

  • Target

    https://anonfiles.com/Cf6151X7y5/grenix_exe

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 46 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://anonfiles.com/Cf6151X7y5/grenix_exe
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:5000
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5000 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:3916

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\69C6F6EC64E114822DF688DC12CDD86C

    Filesize

    779B

    MD5

    52459475bbead1cc9bba0ff24722c884

    SHA1

    1e6cddf21f19f4819050782cd075b72fc96abd7e

    SHA256

    23866b98ab3cc0c8db11f876560468be263c7bfd29c2de29cb36e6eb68c5c67b

    SHA512

    9fd1c809e66ae2443bdc9adb6e3bcc7b50a26eb6f518d317bd1b9a152cc9164145637fc393fdd6e4473e84dce947d638127259684a49bdd33dc5458385e6dbb6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157

    Filesize

    302B

    MD5

    e56a833236772c93cb03849c78594561

    SHA1

    60af1c34be6863e7bc4a2f2c9db98e73a0487c31

    SHA256

    ac16d020090c3da429a95176a4be3322da600dc5502c96b8f7932157903d47eb

    SHA512

    a422e38af11a406191302fbad324cd6fa0dad7f9c5ffd5e9ef3562de14c5b7b5a95c2d5548428a801e24c03dde11a36a4c18d080f0bf7d4ee0f26033cb655c5a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\69C6F6EC64E114822DF688DC12CDD86C

    Filesize

    246B

    MD5

    0cda252170a12d9296bfaa0123004d9a

    SHA1

    0185b4db9a2dd8a695b88a68b79cbc524a41e890

    SHA256

    36b54fa33468c6e7f06c8460d27a080df0993de1a2bbb22f8ea746f6efd7e82d

    SHA512

    b0ed15d82420576628d30f9bddbb152258642ebfde4b6294355bf2f1994f19d7376b5dfbb33e36a6b392d91de53466e2297b2c11510f0776a3d6f339b8f5bf41

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\zpu22o1\imagestore.dat

    Filesize

    1KB

    MD5

    3df78461759ca5547b47cd79242d7aab

    SHA1

    7aa77eef8fe3887c7165a73c159e158d59f74769

    SHA256

    1e8fa99805f49d2891f51e4b3b78d8de0783a97abf63f9940517ae065f94d38c

    SHA512

    580ad97c3895367f304d0534175f9da7b3e77f36d91db52f0cd9714e94f3846ad387b3dbbcef4dfc780ae951c49867fecc00768668e04cffee96158a55d3943a