Analysis

  • max time kernel
    117s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    09/01/2024, 05:52

General

  • Target

    https://ymarket.co/345433434/467383u4rhjedfsfdsfd3432.htm

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://ymarket.co/345433434/467383u4rhjedfsfdsfd3432.htm
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1272
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1272 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2804

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d69225bef6fb13b5708cd6a66f0d89b6

    SHA1

    9cd25b056b1725008479046b66e75b787a936c6c

    SHA256

    c141d08d7c09833b805a0651b32f55a8ff4a2a7957f1b74237fd25a3df453c07

    SHA512

    3fbf539383263a943b1a4ecf6905023bcb57b89045b462da420489a83bb927aa05b116a616c1e15f2682ac0ef3d44f5d1f7744b4632b3665ebceebfc88e1acde

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    35864a76760df9a95ad7ea1a725acea6

    SHA1

    e402a3418939ce858fcd8b3dd4f8d99bfbb8f164

    SHA256

    49dfde9fb163ae8ca3dabf5ea5e7600f069004d108c136cd48c3830259eb7ac0

    SHA512

    44022bb48c503bd55c58321abe920c329f116d1d3368a572e854b413e2ba9e110690610cc2a373597d7d085a681b9ad770a1318593dbca75812443b399fe7146

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    db46e03923e14f264dfb9db9e4c0e178

    SHA1

    74f0a894eefb494f32c30b41e09afc7949b8895c

    SHA256

    42cdc279e8bfbc6a45e919a6e3594befe2cbb7b28bd2eae4f1369ab4f6c9556b

    SHA512

    c413b36b74cad6eed671d9c7e9e6404330704d748fa427caaf80ca4bc3042b92477cf3f88993a9ae48363a0e0ee30c5bca6b6488fc11b5d8ea82e3bf55a1ccce

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1f35cce1f5b1a7bcd38fc108907cf6e1

    SHA1

    6bccfef6fc905505d317ca7f85ced8f34efc04ed

    SHA256

    059ec718f54e91aeb84be67142835e8e4e8b8a0b7ce60c2178b9443059863025

    SHA512

    5a2782e833d4aa9743249387d673b51562a4a2b0fabd6cae74a59ab4f9bfa85498e6852adffd5c38ecf4e29e981d13cc906fac846a8d8bdd2e74effade6fcfa1

  • C:\Users\Admin\AppData\Local\Temp\Cab234A.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar234D.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06