Analysis

  • max time kernel
    71s
  • max time network
    135s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    27-03-2023 13:34

General

  • Target

    http://krasnetoje765.pics/svkoda/

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http://krasnetoje765.pics/svkoda/
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2932
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2932 CREDAT:82945 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:308

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    Filesize

    471B

    MD5

    bb4cd9db319e8007cd72aa17af4b76a0

    SHA1

    8951973b028c09c71a792feff54e3096454a8c42

    SHA256

    aca8049efb96040e2124d06db9c9b2f3c5ce4166c831dabaa421e14cb5da1295

    SHA512

    6187a2b310a672f9080b9865115f44ea827a4f013f791105efc1f7641f11f9759877d61f5c50140fcf892b95318f1276eace9f78161dbcaf6e011f31e34f0729

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    Filesize

    434B

    MD5

    d9c1504cc29662b9a2b461c1524d3a31

    SHA1

    0d1b2791ffa9b86db7876bd92f14b3fa1843f696

    SHA256

    2b71b66c28ed75e5b5416938796ba357cbb351b1604664f7e0d9361c548f7eba

    SHA512

    ef2a95bdac1a628eb744cc80036951f353b975379e2ee2daca1b60697d128360a604552302198cef041e5b1b65d74ede79d0e87e0bf8465c0c7d0201b9e7715a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
    Filesize

    4KB

    MD5

    da597791be3b6e732f0bc8b20e38ee62

    SHA1

    1125c45d285c360542027d7554a5c442288974de

    SHA256

    5b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07

    SHA512

    d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\6CI3IN3W\favicon[1].ico
    Filesize

    1KB

    MD5

    623ae5e015b72f925944b90bff86aeec

    SHA1

    ab3ca670e8865992ff6c5f2b8eab153fbd0ce757

    SHA256

    66810b118430a706658217274d06e489fc5fd80de03f61e83b8cec6e28e9fc48

    SHA512

    b0d6e08c46d347a53a369201b2175a4939b05cdc9bcc07a496ec1f1160890315a20fa17e6304dc6352b774ec5bda26817da5a064276a01ccd27308b5444555a8

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\O4HR65AL\suggestions[1].en-US
    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\4CB97Y9A.cookie
    Filesize

    611B

    MD5

    73d8daa82cedd07884a530d19cd63d0b

    SHA1

    2a0d34e5e4f3c739d88db940d9abac28d1c18749

    SHA256

    c85a8d8b6a4138c59214ea75c682137964a564de0b73b90dcbf23c0f15296c87

    SHA512

    bfd4afdec51e473aec68f0e8ea2d8476a8d10b1c47a418d522a93b07fa7d94223167d967cbb25906a6a4f14161a5c3a8c0a681bfb4d945de4e9599073bd66283

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\LGXGKPPA.cookie
    Filesize

    244B

    MD5

    d9aca3b7599d9ec21a8fe4cd5a61d220

    SHA1

    3b176e1996a4bd5c6b62b9ec1c791f4f8e187d24

    SHA256

    7f4543ff171554dbb1e94df74df3fb24c3ed69ff25dc37e23f252beb1235f5bc

    SHA512

    21f063b223dff5e701f97d59a5523d99ee80973581f6331504ebfe5f132b8f0ea4b4a291944f857d8609d035596756ef65e55033d9b0048683a8efcf1061285b

  • C:\Users\Admin\AppData\Local\Temp\KnoDB80.tmp
    Filesize

    88KB

    MD5

    002d5646771d31d1e7c57990cc020150

    SHA1

    a28ec731f9106c252f313cca349a68ef94ee3de9

    SHA256

    1e2e25bf730ff20c89d57aa38f7f34be7690820e8279b20127d0014dd27b743f

    SHA512

    689e90e7d83eef054a168b98ba2b8d05ab6ff8564e199d4089215ad3fe33440908e687aa9ad7d94468f9f57a4cc19842d53a9cd2f17758bdadf0503df63629c6