Resubmissions

14/02/2023, 02:51

230214-dcgnxshf5w 6

14/02/2023, 02:44

230214-c8faasab83 6

Analysis

  • max time kernel
    465s
  • max time network
    468s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    14/02/2023, 02:51

General

  • Target

    https://drive.google.com/file/d/10FLUV9ne4DJeBbaYuPhYgNO2396Pc6Kr/view?pli=1

Score
6/10

Malware Config

Signatures

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Modifies Internet Explorer settings 1 TTPs 51 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 9 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://drive.google.com/file/d/10FLUV9ne4DJeBbaYuPhYgNO2396Pc6Kr/view?pli=1
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1576
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1576 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1396

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    340B

    MD5

    e23179c5ec1dc2380dc15261ae5e8941

    SHA1

    1f40c686681d78ad23091b4281f5d7efc6c33721

    SHA256

    e9e763f2f4243b5a7c960594f9c7f21ff692730e5b9ac8cb94d4982c864c95cc

    SHA512

    2adc1a2573d4cea96c8a3c1d10d80117d08e0808d694e3a46a32e0d5cb09af75558fdad583938997503db4e7def13c70626f76eb5c6deaa0617fea87074b79c7

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\lwrmjt1\imagestore.dat

    Filesize

    5KB

    MD5

    33d85e7101089a0f57cd61aed2c37357

    SHA1

    40ba194e45a8d7e4d19cae06a72dbb1b6c6aa2b0

    SHA256

    6d5481d4270bf8e55a795d4078e76a4bebb58658e426482d47c9f7289aceb175

    SHA512

    262687154c4cf2f0f28051d1acb292f1b0608e6a194ac50b8ad19aba43c973144cdf8d00a028d504b3acfaa8c09954cd409071dfb1e8a51310954f137b5ed361

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\lwrmjt1\imagestore.dat

    Filesize

    7KB

    MD5

    dec1c5a827132100dc4b3dd5b089a1d9

    SHA1

    2a736881d9c38069eddebd72dcfda63c1d211614

    SHA256

    785733db7d00391941c1c859c63cccaebf0dd1212948fb277b998cbcd79658ea

    SHA512

    4242a594a9adaadee20d8173557e4ab9fba3a6704b52df48cab541f8378ec416c8e29648aa73ce4b1770b053cd3e4187433d2bd4b7d5de1f78326255fb6bf5ec

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\WFJCMM5Q.txt

    Filesize

    607B

    MD5

    7548393537e82414475f6837c28411ae

    SHA1

    0c59816dd415d46d2f08ba528559af1d455140d5

    SHA256

    bdc60b5f3c4b46edb557d7b2f05f6c10520eb7dd2605ff5d05e7f2f98c51fdc9

    SHA512

    d862df888628a11ee9085cb56bafff88014899b7201e20564be4f4d2d3c1c5ee1c9afaa996836087a78504dc96ed0d2a251e4bb348623c66e29f6560fa962d4a