Analysis

  • max time kernel
    95s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    18-04-2023 22:20

General

  • Target

    https://twitter.com

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://twitter.com
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1568
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1568 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1680

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    61KB

    MD5

    e71c8443ae0bc2e282c73faead0a6dd3

    SHA1

    0c110c1b01e68edfacaeae64781a37b1995fa94b

    SHA256

    95b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72

    SHA512

    b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    a06e53b8ee262fe3abd78c06292e1786

    SHA1

    962efc635e40e3075dc99e16b0cd8a7c49ce8611

    SHA256

    192fc0b244306fbbaf5afb7d81526375fce4a890a7ec4da68a86a9b288e4d6ca

    SHA512

    6fbc7bec83e05e6cdef5555cef0d8adf1337c59a1573f9e825e13400ae8747a2f3d22f351d46545018450286ba3517ca5a8ce1bb5921ea3544ac23147b79a78b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    5fd8051a8dbcb7912347de4f38cf2480

    SHA1

    a087e615800d9ff8d89503e88e0a83797c305837

    SHA256

    cb472145aecb8654046b625164fea7b6eef2915522ccb2b4bf53a0bb6f80069f

    SHA512

    10a12082bc16f51d758095964dbec5a90ce00ef737494566c35297ccd3ef6fc0c2c1219431e4e6468650eb7104780b50af09c9230762feb64bcd4f3c67fe67b4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    faf586ea10e2187f4680a9c058b6d7d3

    SHA1

    157301dd57a13fbea79a767a95230c6c13a1cd31

    SHA256

    89171906ef560b350708a4adb7f231a322b6eac429ef245715cbd53522e28d3d

    SHA512

    f7552d8a7eb8ee3eaf8e1f7ef52ca7f6a0507ce4dcc8dbaa95b6ec97ccac20e450f993f73712af1e9db6800ad37d73f63a8eef7153916c4fe20c781c592771c0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    912172c9a3cf99e45ff21c74b2c0b8ed

    SHA1

    61958a14ac9414c24e193aaaa25034834d9ae421

    SHA256

    d5d66e434e61303a920b8adef16b9c94ab9277d27b0f7531cb483b305c5d8399

    SHA512

    f1333e8c0c3ca69eb1a06aa159c2727fb4f7bc760935af13f2a01a0e04d63d070e41eb9e65fe401626d02dbce866dc3fd20f00c4127cb8cf962b3956445785a1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    7bd10142c66a264f8a4eca2e242b4239

    SHA1

    4eddfe4da8a747b98462b717ed01b1a1cb0848b7

    SHA256

    3fc1846970c74706cc97a7c693363e10a1823e529334e2de7c781f2ae4033739

    SHA512

    94074d3cce3ae2eebda7a1200b840adfed6923cf75f3801db4c818766377a35c2fa7cb728d489611e0519fd483884ab4b2ff93a1b0175a7de631cab4ce509b8a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f052eec63e6f45a5f863884cea7a4a42

    SHA1

    e7a1c32d4f1435b48c8f746cb728c3a434918869

    SHA256

    a3e42723dfb667047597d4cbfb3ca60078aaab5c145067e4e7fbfb654f7b456f

    SHA512

    4240080e7a3935827263d011f8b0b737bfd22d8db7ddfe3d3baf29da2938d90484340a7a754d20bdced314cf7e125630c7a9291d859245a4ff94f02b75efdf89

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    224c3d184b714f1b9c40b047b83e4cbc

    SHA1

    6b8ac0caff98ee529aed62d5421c089427ada768

    SHA256

    4adb595c1dbae9d2d4143faceb2083b93fecbd7905cd104d57667853e6538f22

    SHA512

    c78cb0de151aaeacbbe18145dae95dd494e5da7c670901a0186b15d9fe4bada1e18d0d9f0d1c4d2c9bb367e1eb0bbbd98d276bbd100d999404c261afc530b1a0

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\RYXN1WWD\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Temp\Cab92C0.tmp

    Filesize

    61KB

    MD5

    fc4666cbca561e864e7fdf883a9e6661

    SHA1

    2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

    SHA256

    10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

    SHA512

    c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

  • C:\Users\Admin\AppData\Local\Temp\Tar92D1.tmp

    Filesize

    161KB

    MD5

    73b4b714b42fc9a6aaefd0ae59adb009

    SHA1

    efdaffd5b0ad21913d22001d91bf6c19ecb4ac41

    SHA256

    c0cf8cc04c34b5b80a2d86ad0eafb2dd71436f070c86b0321fba0201879625fd

    SHA512

    73af3c51b15f89237552b1718bef21fd80788fa416bab2cb2e7fb3a60d56249a716eda0d2dd68ab643752272640e7eaaaf57ce64bcb38373ddc3d035fb8d57cd

  • C:\Users\Admin\AppData\Local\Temp\Tar93D2.tmp

    Filesize

    161KB

    MD5

    be2bec6e8c5653136d3e72fe53c98aa3

    SHA1

    a8182d6db17c14671c3d5766c72e58d87c0810de

    SHA256

    1919aab2a820642490169bdc4e88bd1189e22f83e7498bf8ebdfb62ec7d843fd

    SHA512

    0d1424ccdf0d53faf3f4e13d534e12f22388648aa4c23edbc503801e3c96b7f73c7999b760b5bef4b5e9dd923dffe21a21889b1ce836dd428420bf0f4f5327ff

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\XFYS008T.txt

    Filesize

    608B

    MD5

    581d6cc6bddc96d069e7b52245063641

    SHA1

    4c53724ba6d3dbcb13d8649f34db11d2cc668df2

    SHA256

    bc4b282152ecc0a0021de113d92a540528f1684c6b48e8019989c7586a436d7e

    SHA512

    055676fcf13b145a917f56bb81c5e0c51f471aff6277a2193d418fc60313e7cd46e6b7ec6c2f0a5c0ae1ef6d9d17294249d6df260bac286c386048f18eae1603