Analysis

  • max time kernel
    144s
  • max time network
    130s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/03/2023, 20:01

General

  • Target

    http://www.dmgmori.com/

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http://www.dmgmori.com/
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1944
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1944 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:4100

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DOMStore\I2B1MRXX\app.usercentrics[1].xml

    Filesize

    13B

    MD5

    c1ddea3ef6bbef3e7060a1a9ad89e4c5

    SHA1

    35e3224fcbd3e1af306f2b6a2c6bbea9b0867966

    SHA256

    b71e4d17274636b97179ba2d97c742735b6510eb54f22893d3a2daff2ceb28db

    SHA512

    6be8cec7c862afae5b37aa32dc5bb45912881a3276606da41bf808a4ef92c318b355e616bf45a257b995520d72b7c08752c0be445dceade5cf79f73480910fed

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DOMStore\V1O0MYTY\us.dmgmori[1].xml

    Filesize

    93B

    MD5

    4a7426422e991db14410443cc66784c5

    SHA1

    d0a380621e41f6a53af931ff24742a0c9d3137f9

    SHA256

    a24930dc8f41d5ac0a5ec95d71793c5ba289ad0e3f61edd464d0639049b5b760

    SHA512

    6237bde4e9409de56b66ec48417a478c53f03f8c60cd47c9d4c3f96952de14cb532540a7740cdd2470185f1f6036a938aa94ed330aa8040fcfeddd0b0ea878a1

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DOMStore\V1O0MYTY\us.dmgmori[1].xml

    Filesize

    576KB

    MD5

    647c093408d74a7ca218567b1403d50f

    SHA1

    abf2f0b1a851bbb4fac15d5243f9c29e45093dd0

    SHA256

    c52d6c05d74999906c892690e712ce277b815e66b934b911d8c1af535072404d

    SHA512

    3b56d6e9369c3a56061a1c7663717d4e17723d3d8d8ceb8ebf414d7128377373b95b1a48c6b0f61de27b5c22432410ba4a40b8c5bf1b3dfffa459c0e6d612464

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\9afmek3\imagestore.dat

    Filesize

    13KB

    MD5

    7c089b13200c65ef8a98c3d1d47b1265

    SHA1

    76c1c9ea77ac4e0f64a3ab6ae17a37fe42e51295

    SHA256

    5056c91eac69d70f9b5f00b82587397de26daf23c8a93a778c3d6657f7652b75

    SHA512

    570911dfb7a88faba1850f046c8ae3680299d10caa27e5d4d8eff4e73c72f0abb5f2ed5ad181fa49fedd080deb1b664f9849cbc4dfda311cb35fef0a44f6bb46

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\9YACFB9R\home-us-favicon[1].ico

    Filesize

    13KB

    MD5

    a4d6990cb591dff5342d6dfd177a91f5

    SHA1

    468f1a64813859b445d98e446e46a047ac6646b7

    SHA256

    6d0a05e97c341071668ae499ab9a531851725b991167fc785e826f581978973b

    SHA512

    bc164dd8edfe2588793fd9f4ec41d2ea4419bd9c979531a899220dee46bfc7610cffec61c0a18142890883c045ea07a3b3fc77a715c12b5d622d293f4b885a07

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\9YACFB9R\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee