Analysis

  • max time kernel
    93s
  • max time network
    101s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-ja
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-jalocale:ja-jpos:windows10-2004-x64systemwindows
  • submitted
    24/05/2023, 03:44

General

  • Target

    http://bCOMb.net:8080/BiBKYMohWluUuaRznFhDh0HkflrYK/M-A4459-TANAKA4?a4459

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http://bCOMb.net:8080/BiBKYMohWluUuaRznFhDh0HkflrYK/M-A4459-TANAKA4?a4459
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2628
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2628 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1820

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

          Filesize

          471B

          MD5

          94efe971fd70d9d426978045456a879d

          SHA1

          97f170ffda6afd79be0795ffcc37c7efd82ee801

          SHA256

          fcfaf64c502c0feb0175aa72247927eeecd556004302a20e09f6fdaa644504e6

          SHA512

          baf5e9e1e9bbbaef3cd6365ec2b1c71314c14d0acd5837c1975e71a374b9fe724035929b47fe5bf5aef5845ef6eb17b178f20460b115419094733dfc8a27799c

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

          Filesize

          404B

          MD5

          25a952807203c286088df7406ad683e3

          SHA1

          54571c728fdf27a5a96d6d171fa8ae04e4ef4f5a

          SHA256

          825c9e16b9cae031cc1aefe30f630eb1e1e1853710ad4f7886ad0d02eddccab1

          SHA512

          37872f83423065cd0e3de9603335675e45442e0031795b5b462fad9340a85d8b70ad38b7e9df1087d92b44316cd3d2eb15a6a3220bb93ebc684a9b834a60384c

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\1B83N948\suggestions[1].ja-JP

          Filesize

          17KB

          MD5

          f0e8351230b562572b4b315a1a55004f

          SHA1

          1cc73361100ce15353f2571a03a5d5a364be87d2

          SHA256

          650de9892142b102c0cd1f9deca25f93d83c0bb8b5434580c77dd4214a82e1a5

          SHA512

          3d7dd1a72a000041fe308828c714ac48c463e0022cad3495296d0eb72a0fc85127b3c46cdc0015da25d41e9d22eba887980c301663f37ad86e7ccbc452934d46