Analysis

  • max time kernel
    135s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/02/2023, 08:46

General

  • Target

    https://newamericanindustry2.com/obq6r

Score
3/10

Malware Config

Signatures

  • Program crash 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 50 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://newamericanindustry2.com/obq6r
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4812
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4812 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2652
  • C:\Windows\system32\WerFault.exe
    C:\Windows\system32\WerFault.exe -pss -s 428 -p 4528 -ip 4528
    1⤵
      PID:788
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -u -p 4528 -s 844
      1⤵
      • Program crash
      PID:4352

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_1DC6D7385EA816C957BA2B715AC5C442

      Filesize

      1KB

      MD5

      959540a7b7e82710cfa7fca1137c4695

      SHA1

      9c39140d378d6996b2476f9deae6163883c9b249

      SHA256

      e0e6290143601b1913467a5c9746d6a802fc4921acbdee0be5cd106866063fc0

      SHA512

      25c2af8b1cf3ed9c5f452335a861f21661cbbe81752380a66e0124f10bf05ce6b6bb0640d8dcc6a56ddbfa3a30ebbb3991362c04c465cd80cc8f8b3ab50446b7

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_1DC6D7385EA816C957BA2B715AC5C442

      Filesize

      446B

      MD5

      032d208dc364ff4b84f56f38a0bb2ca4

      SHA1

      da9c60df3871c12328d7533cb8977a10debe8b62

      SHA256

      2aa8ce5341b432d946f2351030c537f8964a0b13b7ed1643e517e4b4ed629e29

      SHA512

      0c3efb6e99a405966c7066015753e8d401eb582d6f9a815cc88e86a70466d58a34b9046abae82a867b1587c1e661c92a11d63c2e639b607c6d0d6ee1416665b5