Analysis

  • max time kernel
    139s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    08/01/2024, 18:10

General

  • Target

    http://virtualblog.me/

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http://virtualblog.me/
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2264
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2264 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1128

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8acdac28c1c6533bbd9548f9824317c7

    SHA1

    24d8b95cb14cd5789dd02ec4dc02df400fdd4647

    SHA256

    bf2762a7a806d4aa625b5ed75949b325ca8c8b28cba285a16e3062f5c01495fa

    SHA512

    d0ff99e6e1cc26e508d0bb1e0ddbb67076a62e39035ce952632cdf16b75361489477ba7ffc6046607e6a734072f66c28e8625f751e12730281580e9a0ceef71f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    16f4787c0e061776869afe90b0a18746

    SHA1

    b4ed09a816bc5e97c5d3e2f00ac2dd2aeee1525d

    SHA256

    a8b5c19d6cf56d791d3d83700787818cba70c20a410f3ac0d691a2921a15bb3c

    SHA512

    db3cb1269d9aed37b9041d6529e9517f8dcdbd2ae7b33dcec7200b8a68b0e6a2208aee7086c4d80c6dd08477abc77566199409972dcc1a256d08dea482e4ad58

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7666727f9e5f404b2bf3ba534cafee0f

    SHA1

    d661104a5a28e8433232748eb8d877ac3f3157e6

    SHA256

    5c37ce10e5a9bed8d8a1598724ae2a4c5dec33ae7293f723ee0117a0a055949b

    SHA512

    42f3cca72522ecf1681be66444f5e110690f2ddeeef28f0f41fa055b5113454fa6e0fe220acb1ebbbc03fa44167eadcd261d523db94e4a848ebf6846cc946faf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d8bb69bb2267c2112d8a39495d5704b0

    SHA1

    a4de7ac41d47715af7e6ae1362b276b6532c13a1

    SHA256

    d3993fdc4ce0d9aca9484e52695e31e8f3b9fd392a1e69cae73a4c14189c68bc

    SHA512

    fd49b82b1016dabea06f0fbe947993e9e73732b1fa6e00d28b30540be14fb4a7ec5f856f5d8b2a6866cf75304ea67ea1dc09c80044eb470be65de9b3dc1fb05e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    19aa6ee69e7fe7e1c5ff204fc3104ca0

    SHA1

    93cbeddff4f6c1a51f391d16057299f717a5bf50

    SHA256

    abae566fa12f5218d607ebfb7de3e10dfa2dff5954eb23a4bd7a9aab0ac9e500

    SHA512

    c4918ccaec66b9df85a14cfc2621a5c21d606b88ff62e8178b2617dc407173938d1915a9de7361d612be51f2cd3c0186f37d84b5c1ffa62bea29390438ecc4e5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    add8fcdd7d077c65e5c112591d98c587

    SHA1

    c57374184247b447e70f8f62742ec580025846eb

    SHA256

    6f372c69750e37f0b6f91a46b9ef984919d52b0325dd333ab7780061a84a8dc0

    SHA512

    8a218dce6da57256510c2af5cb46b61fa38c08581946715a8ea957fac8828004c0b5f7d35c97d72347c4b889b92d71842c32905e9c916d04e431989cf138aec0

  • C:\Users\Admin\AppData\Local\Temp\Cab4B25.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar4B37.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06