Resubmissions

16/02/2023, 11:19

230216-nezbvshc72 1

16/02/2023, 11:17

230216-ndsspahc64 1

Analysis

  • max time kernel
    66s
  • max time network
    75s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/02/2023, 11:17

General

  • Target

    https://it-hub.ro/BKIu4jn7V6F.php?sess=eshdAyYiq00ARAT66GNpwGZdjV0ocbdNJY2egHZ8cTHpD7voZA3hsCAEN

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://it-hub.ro/BKIu4jn7V6F.php?sess=eshdAyYiq00ARAT66GNpwGZdjV0ocbdNJY2egHZ8cTHpD7voZA3hsCAEN
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4972
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4972 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1344

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

          Filesize

          471B

          MD5

          9597f3dce8d1b570f78a65ba29110c19

          SHA1

          ea96f130f2db9598f8785742dd6980e87c0b842b

          SHA256

          6385202cebf552cb037b90b20ca921f8b481b3154fb6460be44e2686252768d2

          SHA512

          b97c6755a29fcb84540e32f60e46d1b39183b9e972af5bd8edb6fb4659ea2b7f01ab1bf1ce4fe50fa311b6cceb715d128feeb7dde17c6db3d7b2f43931934d6c

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

          Filesize

          404B

          MD5

          99be543808450e702b659dbf957b92c6

          SHA1

          6cde3fb512e99311313c4c65741dde97656dbfd6

          SHA256

          8342b0a8fa40779bb7f18675354f0f50ccce8df8d29516d3a97add3da0d32788

          SHA512

          b97f52d85df139eefa335a8fbf86ba1cb65147ec11a5fd5d4304a7949eb31eb997935cf0231a64b5f39c4769ebb280868dff966de63cc7a9b9d7b35989d2ba65

        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\dqptnfu\imagestore.dat

          Filesize

          9KB

          MD5

          ca818152e1f6d768600cf637d5d08e40

          SHA1

          2569f2f5ace82f79ea255077097176a6e4fbc0ac

          SHA256

          d7deaa9887ef1e2b861ff85c132b473fec322bb873682154df29fd6aacb4976b

          SHA512

          653ea017d0721a50b52bfe7d32efd638f8a62aed71b1bc3cab75ca4e0fe9d2c4ab290a742b4bacf689678ed5a491ed2ac7900d4f6b1dc22f4229194c39eb2c00