Analysis

  • max time kernel
    135s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/06/2023, 19:28

General

  • Target

    http://chalubinski.edu.pl

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 11 IoCs
  • Modifies Internet Explorer settings 1 TTPs 50 IoCs
  • Modifies registry class 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http://chalubinski.edu.pl
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3524
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3524 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:4624
  • C:\Windows\system32\mspaint.exe
    "C:\Windows\system32\mspaint.exe" "C:\Users\Admin\Desktop\ConnectSend.png" /ForceBootstrapPaint3D
    1⤵
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:2400
  • C:\Windows\System32\svchost.exe
    C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s DsSvc
    1⤵
    • Drops file in System32 directory
    PID:1008
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:984
  • C:\Windows\system32\mspaint.exe
    "C:\Windows\system32\mspaint.exe" "C:\Users\Admin\Desktop\ConnectSend.png" /ForceBootstrapPaint3D
    1⤵
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:1820
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:3720

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    a244894fbc1ca90d08cff32fb6cd308d

    SHA1

    59e3c026c3d1bcd549f697b5dd4a35e298c9d2be

    SHA256

    a6b607b594b789a6ab1671c98fe9447509b82a85cfdcf4693b253616568e32ac

    SHA512

    b62e636d9d0e9e67ff310f3370ab1ca66abf93efef89a9a0d6d79e4526d8904a49b01f39ce64b76d3db03ac7080f62a84caabfbfc7bbf0244e2601457ca7e09e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    404B

    MD5

    a37da126c81ef34a1d449f3fe6cbfab9

    SHA1

    6541dc109bab6b01df50835d5254d3cd5b528e69

    SHA256

    8677e66466f85c67b4f36e88bfcf7ebfbb9905aa2b0fa01c342cf3592adeabd3

    SHA512

    3004e027b421f62dfddc1881a3702c34fd33656fb4d11d759e4ff2ef1a936ec7777204fb8a0291e8225a633a5ef4a2f21b98afaa880fd1cd0e43e82b48bc51bb

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\dcpq11e\imagestore.dat

    Filesize

    1KB

    MD5

    0eea3875b5349f24c942d49ffda42589

    SHA1

    a9ae21e538ceafe82f29a445847e2c1b6f32a2cc

    SHA256

    f6e2235bd40c73390ed1bef0eb81116d67c32bc0de276c3c20026002e550530c

    SHA512

    5ba94d03fc9a13573346b417435892e8f2edbbe485fb14cbecd7f0e8e7e8d22b418277e8648a5413a9719181d75fae2a7b1ae1e049988c77bd568c5b481f52fc

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\4HAJQ22Y\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\LZ0AI98S\favicon[1].ico

    Filesize

    1KB

    MD5

    95b95a890f974b88b10f675aaf08c55c

    SHA1

    189e436b8ec5d4b9c3282bb771853f9ac8f995cb

    SHA256

    dc9a4a56c2664341732638d05b6b1376497f949f62d0f184b646299e5657960b

    SHA512

    7393841b0a8ea4284fbc70e41bf2322b27a78710f3a763b4ea512503576e72362196334b86ab87d42afcbf4cf5854a4917788c156d89fb1df0d7399fdb41e38a

  • memory/1008-394-0x000001700BA50000-0x000001700BA51000-memory.dmp

    Filesize

    4KB

  • memory/1008-392-0x000001700BA50000-0x000001700BA51000-memory.dmp

    Filesize

    4KB

  • memory/1008-395-0x000001700BAE0000-0x000001700BAE1000-memory.dmp

    Filesize

    4KB

  • memory/1008-396-0x000001700BAF0000-0x000001700BAF1000-memory.dmp

    Filesize

    4KB

  • memory/1008-397-0x000001700BAF0000-0x000001700BAF1000-memory.dmp

    Filesize

    4KB

  • memory/1008-398-0x000001700BAF0000-0x000001700BAF1000-memory.dmp

    Filesize

    4KB

  • memory/1008-390-0x000001700B9D0000-0x000001700B9D1000-memory.dmp

    Filesize

    4KB

  • memory/1008-383-0x0000017002D90000-0x0000017002DA0000-memory.dmp

    Filesize

    64KB

  • memory/1008-379-0x0000017002D40000-0x0000017002D50000-memory.dmp

    Filesize

    64KB