Analysis

  • max time kernel
    86s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    15/02/2023, 12:29

General

  • Target

    https://top4top.net

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://top4top.net
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1652
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1652 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2040

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

          Filesize

          61KB

          MD5

          fc4666cbca561e864e7fdf883a9e6661

          SHA1

          2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

          SHA256

          10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

          SHA512

          c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          b8a70a87328f072846cdd97266be9125

          SHA1

          d53182705fbed4612aa624f60f65af8525b19404

          SHA256

          c689a17514bc8368c8e7cb66ad53802ed062a4abc30d57b3b3eb7deab3ee91dc

          SHA512

          d336edfdb56027d1c713683e8944888e0002df1ce1cf8ddb134f3e1670576e57492c7bef54632a5ea6620a85d56fb391dc6e928f74c6ad3ccb67e8517c8ac10b

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\B1X2XPIX.txt

          Filesize

          608B

          MD5

          4f030e4cfff7e6a2cb10a09a218e8e1d

          SHA1

          1a7ddc1aab8db907e26668ae36ec8e1770b1b895

          SHA256

          acca21df0bb4ae5a82f0a28c1c68214057054decc9478d6e4cff04b98e5af836

          SHA512

          47fb89df8dd88fac079d1e176a882ef921d81585812728a8e7b8a095d71467504d368639c94990e926d7fac5a592362b4ca991842cf625a854e77c9e90d2fef8