Analysis

  • max time kernel
    30s
  • max time network
    34s
  • platform
    windows10-1703_x64
  • resource
    win10-20220901-en
  • resource tags

    arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system
  • submitted
    16-02-2023 14:39

General

  • Target

    https://www.pokojeutosi.com.pl/ufMuu8yp/?922lXhb413WZ08ZG36LApx7fkInaGeFRZOptYSbnytXOimSDh0Rio517QnEOsaUTaGeFRZOp1EbsnhaGeFRZOpWLGwxkUF3OJj13NEBkUv2scwbShXYWcGzxHW8WLGwxkUtXeNrOJuqwRoFZ6TCiHh9f7XkkWLGwxkUSB1N2EKMpsJfEOY8SFhiPhhUx2pL4wED9ctXiBkG4kvXzZhv12qP6PiaGeFRZOpVgDcEVF1HA5Z

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 32 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://www.pokojeutosi.com.pl/ufMuu8yp/?922lXhb413WZ08ZG36LApx7fkInaGeFRZOptYSbnytXOimSDh0Rio517QnEOsaUTaGeFRZOp1EbsnhaGeFRZOpWLGwxkUF3OJj13NEBkUv2scwbShXYWcGzxHW8WLGwxkUtXeNrOJuqwRoFZ6TCiHh9f7XkkWLGwxkUSB1N2EKMpsJfEOY8SFhiPhhUx2pL4wED9ctXiBkG4kvXzZhv12qP6PiaGeFRZOpVgDcEVF1HA5Z
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2172
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2172 CREDAT:82945 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:364

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751

    Filesize

    717B

    MD5

    ec8ff3b1ded0246437b1472c69dd1811

    SHA1

    d813e874c2524e3a7da6c466c67854ad16800326

    SHA256

    e634c2d1ed20e0638c95597adf4c9d392ebab932d3353f18af1e4421f4bb9cab

    SHA512

    e967b804cbf2d6da30a532cbc62557d09bd236807790040c6bee5584a482dc09d724fc1d9ac0de6aa5b4e8b1fff72c8ab3206222cc2c95a91035754ac1257552

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\2C63781326D3B6A15AC164239CC09C42

    Filesize

    503B

    MD5

    4abba1fc8ef4b1967ec8c3565a612509

    SHA1

    fce4f7ea9c9254fd2a1c2d17c5a1496245d3b7eb

    SHA256

    c904ac77831a4ad0dce438e975a98675987805d52e7e5233188165155de7c3b3

    SHA512

    ea4d522a4b3aae9406e68334388745edbb9beaa8760fbfdb24ad2f53274dad4a1c0e58e6c1a538bddbdfe8da957e73383ae3575985fccd3badcdacc769a74724

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751

    Filesize

    192B

    MD5

    aab2617c2c82459c2a97ad3c3696f920

    SHA1

    bd6f356086f509b137d15a0652dc5e2c71f23ebd

    SHA256

    6cbf322fe4b0ee42b6667fa1aface798ed6e3d9649b81ce2a625847bcbe8d4e2

    SHA512

    4d02185d7f547ff0225f5f619cccea5b242b4b0fd932c7d112e9cd7880b3de80301db91f4ff0bc52ace9f2e35d29989eb9152b2c5ff86ac3d30d8ca4287a6ee2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\2C63781326D3B6A15AC164239CC09C42

    Filesize

    556B

    MD5

    b890a042b340fc8533ac54ce6bb9647b

    SHA1

    9b1317b917a88133aa5f8019424d99514c2d5b6d

    SHA256

    9d1f2a54701cc93b1c25be9c1fccbc26f7976b00f2451c8900cb4563e3619e2e

    SHA512

    268f41250d8a9290fd734402e6d27ba8f7491df2915a8db2997def3eaae58a1fefad591b01856c217f5926a6656ca85d9cf382509a3115252c5705d8340f170b

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\X029L5PR.cookie

    Filesize

    670B

    MD5

    23eee2e17c9b0c23ce17ce6add64f29b

    SHA1

    a25b6a1d3001f86a07f53291a0412b87841185eb

    SHA256

    5bbb1ce3fb1a3dbbf5f197e19dbe45100c7aac52a5995fc65476fa739b6ec837

    SHA512

    2c328d87e1ded4f80a7cbb222489bd843102af639536f5474da7937580b97f840d7b62df6d3f47662b36726d61e0e5a1b8d455eb5483b44e02b8bf77184691e0