Analysis

  • max time kernel
    131s
  • max time network
    134s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    23-03-2023 14:45

General

  • Target

    https://www.timesheetz.net/EtzWeb/u/a73077aa04

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://www.timesheetz.net/EtzWeb/u/a73077aa04
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3296
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3296 CREDAT:82945 /prefetch:2
      2⤵
      • Checks processor information in registry
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:4144

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27

    Filesize

    1KB

    MD5

    9e6d8dc41604f29e642cd0388dedbc39

    SHA1

    356865a43d9fe59ffa43408c8656722239df3746

    SHA256

    81ba5efa129a1fe50f089166e3bef04a5472f35d87fe32e48ec078557b809537

    SHA512

    2e8ee9015b023d1da8c7c00eff12d780c1e640171306f8ebfcf6ac344a3f4553d2b181c5983e4c792b3e226e96eb8236bb9cf43c3c51ed504e27d047ff9d5dc3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    7e6edac4c08deaf3549189bfc3fb721d

    SHA1

    1bc71fc3691ec8fff202ef503f30c83673709055

    SHA256

    99600b86d6c324e84351dd8f09183150203c83df6188ff21104f3808e57adff9

    SHA512

    e5fe4d62400e6dd9d835111384b965a1ee33e72cf2f64724c22a535e133eb71196bce1566f9f2ed15c5965709e9e29c27bcf6744efc671bf406c9acd416946a6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27

    Filesize

    438B

    MD5

    1d0804ef5a1c6d37891215762aeb5fff

    SHA1

    a1734718c1ca6c9168cf9e07f4c20fba5d9bd139

    SHA256

    4a446732ee12b758455906bf49c686b2819a2fd4e4eccbf71a720cab316d9dc7

    SHA512

    61dc2c7cad6141a68cd55a168aaca07c35e7cec28cc6197c01b39d0475ed291327b4d995b00724de5f77f600d77d389c3890d657084c830d485c884618e61437

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    434B

    MD5

    3739ea683220ec88549b79bc9746429c

    SHA1

    3b5374ebcd7826cfae8cf3df7bd496227c5ace0f

    SHA256

    06f36f4ef499951d81abe019308667720dcaee3d0c66d0cd6144c3ec4c92205d

    SHA512

    51ac60e106276a4c2528d57b8318c541b131e13f2723f91d6b346cc944f8c737b9a1812d31869c2a20fba319c65397e539d6c96ceb3bcd7dd4069aaca8177f11

  • C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico

    Filesize

    4KB

    MD5

    da597791be3b6e732f0bc8b20e38ee62

    SHA1

    1125c45d285c360542027d7554a5c442288974de

    SHA256

    5b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07

    SHA512

    d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\480JMPRZ\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\O4HR65AL\favicon[1].png

    Filesize

    2KB

    MD5

    7067fd3f2cdf4da8858c5dd1695c8314

    SHA1

    385be7a93e70a5a6a44c5b4283dabfcbe11fe83b

    SHA256

    a93f734d47e37e634e7b24741867cd7a08eb62dce5e7d4c55a93efbb52322ae0

    SHA512

    7bfa149aa95d6a6caae5986185dfb12299c51d74e7ebfa974349ef6a57ceff4ec6db10451a9b24aeeb9850ece8b65ff4c38b3bcee3e9d92df066f83069e9b2dc

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\0OLEHADD.cookie

    Filesize

    244B

    MD5

    d228839deee6f6db6d337788ca787efa

    SHA1

    3381e94be5b2345ff486b241a7d299fc84739e83

    SHA256

    06ad04cd391d5630af1ed23bd8ded738e8bb78d6e630aab82600d99f568e31a3

    SHA512

    424fa8944494eaf5a9c581b27310eb2c3ff1304de5d2df1b81c6f1fb5d825b4a9299557883fc6b1e09d5ebe11346a959b3558371522368cdfe17dcbe25d075a6

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\53PCXRG3.cookie

    Filesize

    615B

    MD5

    734bb9f98f963b98e8f96c3fabe1de45

    SHA1

    d3c690a29912bf004944bba2b3c68cb40e12bcf6

    SHA256

    b447e5cfd60d77dcab7115f0526e3ad9dac9f1655baa2868b360b1ff6ef5fe2f

    SHA512

    3884a7bf754a27a163db79c9c0218c08aa96a389e98e4ea0b7d6f1917e8d34866798e0b49ec797a20be3bc39307fbe09c67143189ec0d41a4639a927831e22b4

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\VH2NAL34.cookie

    Filesize

    97B

    MD5

    fa17374b9c3bb977293219fb378f0896

    SHA1

    d33187f104c21200e52bb2d898e67280aefcd764

    SHA256

    9f0bbe064a086f333cf2fcec8c1ac5f94bd95f91d76fdc11fc1509f3aa11d3c8

    SHA512

    4377e8d74a7c9f6a20f664636c17ca93d083cbe2ff41d7f649a0d0a221d49da13f7d58537dfc0cedf20ab90573ab488ff82a3052c44a210de2e8520a05f811c1

  • C:\Users\Admin\AppData\Local\Temp\KnoF021.tmp

    Filesize

    88KB

    MD5

    002d5646771d31d1e7c57990cc020150

    SHA1

    a28ec731f9106c252f313cca349a68ef94ee3de9

    SHA256

    1e2e25bf730ff20c89d57aa38f7f34be7690820e8279b20127d0014dd27b743f

    SHA512

    689e90e7d83eef054a168b98ba2b8d05ab6ff8564e199d4089215ad3fe33440908e687aa9ad7d94468f9f57a4cc19842d53a9cd2f17758bdadf0503df63629c6