Analysis

  • max time kernel
    89s
  • max time network
    136s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    14/02/2023, 04:26

General

  • Target

    GetFlashPlayer.url

  • Size

    144B

  • MD5

    d790d5dc27a60a698df6d3b8bb384a33

  • SHA1

    d68a7d48b3cd198b8ff131e827f4dbbc2361fdb3

  • SHA256

    d3bc19eb39a08f082244ff45097a78429a018a8b479f481ebdd6528ffffb7d95

  • SHA512

    57305af5831206fa37b7f3a6e71fbe92577a52efc79d940ac9ef693d84baf7e03bae817049725dcd3241decb127d05e0f74b543f5ea323bc39db3ccc1f4ecbe4

Score
6/10

Malware Config

Signatures

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 49 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Windows\System32\rundll32.exe
    "C:\Windows\System32\rundll32.exe" "C:\Windows\System32\ieframe.dll",OpenURL C:\Users\Admin\AppData\Local\Temp\GetFlashPlayer.url
    1⤵
    • Checks whether UAC is enabled
    PID:2020
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:892
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:892 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1284

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    340B

    MD5

    61851ed8bbdc358eb10011c554a5e6c7

    SHA1

    ffb1a874fe390b3903ce9372a418adab698fa9dd

    SHA256

    cda1dd1f2b54b533116c410fbd5ddc46a4d61d984a090c1b631a70f8ace467d1

    SHA512

    926bb52314ca27e01c8c0da6db998c42a36ea9eab861418dc74b122eb3b2a93099e871820de0c27de0f06c14f462634049084a3f01975b0d6320493d8bcfc425

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\tcz8fqz\imagestore.dat

    Filesize

    13KB

    MD5

    2f548dc0ec05a81d4f0be0c0dce7e7f5

    SHA1

    f811006ff9a35beb4fcb28590104140faa2b2bad

    SHA256

    86f5254117ca657f8821c76cefbd3ebe27490d2136fe18193899e323db00b4ee

    SHA512

    624d2d5d3c8f39cc968fa82ad12a198f815e0e8da42cf8f2320c81c7bb2ea1b8493e5a71574c87e7c0a94bbba184049353cb5fdf7941a6c3227d6d407cfe150b

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\OQR6G8XY.txt

    Filesize

    603B

    MD5

    22a57b5abd27b03623183b4dc2a0ed85

    SHA1

    ae2541ebbb3c761c716438e2331d42c2cd6d5dc8

    SHA256

    ac0c647119f5dbfddf729e5282ee72e754b0766a8ef3c3559131d8acab77eacb

    SHA512

    0257d8f6720965bfbf2526f4cadd5821f3f537a6ab45f536221a997875354570c5fc561feae68be1daeb4065ac4298e53b61580542157c752fb7b8850f878ff4

  • memory/2020-54-0x000007FEFBD01000-0x000007FEFBD03000-memory.dmp

    Filesize

    8KB

  • memory/2020-55-0x0000000000140000-0x0000000000150000-memory.dmp

    Filesize

    64KB