Analysis

  • max time kernel
    15s
  • max time network
    23s
  • platform
    windows10-1703_x64
  • resource
    win10-20230703-en
  • resource tags

    arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system
  • submitted
    08-07-2023 09:52

General

  • Target

    https://copelyroq.ristorantelatrafila.it/

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 14 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://copelyroq.ristorantelatrafila.it/
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4952
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4952 CREDAT:82945 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2240

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

    Filesize

    1KB

    MD5

    c6844a7892056ca8c0418cf1b91bbf7b

    SHA1

    2a3403af55c4a566fb4a1146ddd939884f0c7a30

    SHA256

    7fa766627d4be753b3cedceeef36d62d3f33475e87233313ed0c476be178a731

    SHA512

    e482be79ec2f0190043a42583e3019c9578d12a0870063a2200c43434f0021a2a15ead7da82d7ff24380b818d8e1b142af424dc0ddf6911b5e799c7909872387

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464

    Filesize

    724B

    MD5

    cfbc16e33dcbef6f773f0f79af528f45

    SHA1

    ecb8d5e8107bc671dd57fb2a137c00bffa419f1f

    SHA256

    f0937890fb1053069baac97b7992c6d22cb74cae20317fc05d51070d96950ffa

    SHA512

    59ac2ead1eb84edffb06867850beb1e63f72c5b5415abd2fd4e7c2a1922c368f612d2a0288c00e32d5da47c4a77968ffbe72660a8d1f577f44fb20df9c11a4af

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

    Filesize

    410B

    MD5

    d181df8cfd35e6855875098f7214fce2

    SHA1

    66407763ff86fe4f3b8a0d0c0d4e0f6967b81c72

    SHA256

    700953fc201678218b7707f2ce8b8cc3cb17c2450bfd5b72dc770150e119a72c

    SHA512

    87c31263c0350a5c1a939dcacebc04f3c427b4f9be16b99ec72d934c646e4621fd6784e6a4260bd4b0158f875325a8e7f03af38ea68514f6a0e1ecb8c0f401fa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464

    Filesize

    392B

    MD5

    13d12b891a450b135219c0876a84c583

    SHA1

    5da86dca84c1f47496981be8d7792ec732f229fb

    SHA256

    5912c77e92262525e01e1b59205deb4ef5594f8d750ba10b3b7ca8292ec38f82

    SHA512

    a25f7b4d17477540324d3800eeb49dadab7e2df5ef0cd43c61efad7d629c671e002554e6ddbaa68cc97bf1bfebaa1391ed36215761a4a66ecd92750cc0cc5f6e