Analysis

  • max time kernel
    138s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    26/12/2023, 12:02

General

  • Target

    http://schoolsbrightestbrain.com

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http://schoolsbrightestbrain.com
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2188
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2188 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2424

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          2057df015220cd33b59e20fba23c8382

          SHA1

          e2ea64326f85eb101da175a5f32e1ef4af203d1c

          SHA256

          f4404c3306d0ea7dea09abafd1379b5164a6163b9a85371533f4f4606e82314e

          SHA512

          4dd9c09c5cd8f135d8b15d6cc58b6d96454bd359b8300b57f954085324ea8abeead52d56ec84c50960f55513150bd342b590c71cca20772f80d1675ab85e207b

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          f77521376d64612b7e9c2e07f6b1a6c6

          SHA1

          a785ba4bc1270b9f17497fac3323c72f24904831

          SHA256

          55f9071763fa0bc1a338c34dd6cf142bca37ed50761bb49127a5ca94430343ef

          SHA512

          498625d77249c09c3d082e9e902f3aecd64bd96b7c6336acb0a4d28aa9a01d5b04e5264ce6cfaad61106f6c6c3c81f146be5cc1821ac63f6069062e12e469ab0

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          1fbe81b2ed7497f3ee5e63c0db2a25ac

          SHA1

          e67bd6533ab9ae4da28dc74686dc009882201555

          SHA256

          447a28559a96d5c4f1bad7fa16063ef70101a24a87416ea271c5ee3886c7326d

          SHA512

          a7e3648bde0bbe6057737eba5efeedecb93d6aac95aeab0a76b0fae5178794017ed28ecb0ae0c4ff37bf7620f573237c3f9ee6cb94ecb929e1747a4c33db08ba

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          5020516c38398ccfcac299956e6dbf46

          SHA1

          4462e08aedda074293439478697cbb48158a43b1

          SHA256

          64deca966a214e8717241dab86b341f2f466882a8af093c9aae79fd547710715

          SHA512

          cda6621ec9c9bffba5afb9a63621617981aa441cdd314f76a7829418022b8c1f8c394cf49a7f391697376a43db40bfc0c2dbf365a8c5a526cf71a7d9dcff1ff7

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          8a632b4ae6c949e547c5ef2f5d1fea80

          SHA1

          fe682dc6de41cbe582d595925b21d8a9d4f3fabc

          SHA256

          68a3dce56c139cc262e3ade380a0abc6ff8fe3bd6efda647ca3bebe9b27a250b

          SHA512

          d22ea1b4e316db8816568a3d3c0d485725c71077bcc030bfab7d5dd1c8b10daaee8a0399325e707b2a7d8dff190b6719585c95a078d6d96ddb4197a778a0a4a2

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\RU3RPYUN\favicon[1].ico

          Filesize

          94B

          MD5

          514eb157c352678fe6e6ffb103579bfa

          SHA1

          5892249a4b53845b0761623aefa1c0d251ccf7da

          SHA256

          5e0f936c52cb1e65ccda6fe580472f66166fa4687aeb931c2f0b25bf8c858daf

          SHA512

          91832b7b508d3386e65bea57a42c5b8af73f5cee55efa0b05ffb8dc9a60473cec718f2d28a9d8c7420ae92ec6ba43a1df598541571ffed4726a61fa4b8703edc

        • C:\Users\Admin\AppData\Local\Temp\Cab5A33.tmp

          Filesize

          65KB

          MD5

          ac05d27423a85adc1622c714f2cb6184

          SHA1

          b0fe2b1abddb97837ea0195be70ab2ff14d43198

          SHA256

          c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

          SHA512

          6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

        • C:\Users\Admin\AppData\Local\Temp\Tar5AD3.tmp

          Filesize

          171KB

          MD5

          9c0c641c06238516f27941aa1166d427

          SHA1

          64cd549fb8cf014fcd9312aa7a5b023847b6c977

          SHA256

          4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

          SHA512

          936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06