Analysis

  • max time kernel
    118s
  • max time network
    158s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    09/01/2024, 17:42

General

  • Target

    https://192.168.0.1/

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://192.168.0.1/
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2480
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2480 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2720

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2feadff65df8b3bea4968436b61841c7

    SHA1

    3b1c76e1d9afed0f0ba819103921e5fd0f8629f1

    SHA256

    974dad6ec52c97650f93715021f57f01a15014c7ebdac0b7fd707fb5757dcc6e

    SHA512

    59151147e766207a5eba10418ad0211f93d2765b92b73effd00db44b078d26a274521a04cd1816f6efc06f1db4b354e00530a11717335f2148a2b2128c5fb1de

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    82d44ead7689ae824951935c0fc9bc1a

    SHA1

    54b888dc01bcbe6a593627b20fa6ced7df3ac0a1

    SHA256

    faceecf3aa51841fa2e847d9d63140e38f3c704bfc06d82b665ae292cfc2fd22

    SHA512

    e67c512f808b6568571fc277f36e5331461b53a893ca49683431625ba8efaeb4b1c568641f8099e67b2619ad8f30599fdbdc21857416bb8e41fcc760a37ffa1d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3f289a454d836b9b0001e4c09a72a7ef

    SHA1

    602f0a8548c210362ef5722ef9e2a5d27b53bcc7

    SHA256

    729217310257f3835953a7d3a8a461a9cda5e082d3ec619f6e1aadde51a30992

    SHA512

    6a69b86c81ecb1a084db53409814d3bc1ce14fa86fcab3298aa12fdc8206ab9a158477803ad80748f83874cd5c15c37421e336ad10468c75a3c0a82de332a369

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d68a5eafbc82ffc48849d0f10b77b195

    SHA1

    012d7639c286c0167413d536717f28bf495ac7a9

    SHA256

    6cb341fd3986c274b270a4bd2a39505e53c46db1bb490b7d772138f192907834

    SHA512

    c722a36e05dd3b87f1498db541b8640fcaa3c2797b685b05e18cf067b59b443155bdd25ef122aaf21776f8577700944efcbfdafbafbe2562f424fb9f8ffcf0f2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    54c124b549af9d339e621a0d8eb50d8d

    SHA1

    d36125bdcf3b4212ba0de35aee6519e74df6d309

    SHA256

    b8efde00b7ef4dec402f11070b54330de9476be5082c2a5e8a184c14396f40c0

    SHA512

    f4dcab94de5049555b06bc362e1029cfba27dddc3649459221c29e68c76246d2ebf2b334fdefa3fa6c1a2f0c6953e31dd32efdb26b15fc913e743831eb5601a0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c269092d9d983f5014028a73071570da

    SHA1

    ccbac93cfc91285fd1edaf52db85849736cbaf00

    SHA256

    ee91bbb3324a175f19b54af7b6b2a000dd95b8ad1558e78d4cb9a0fca9b0884a

    SHA512

    4d5c237b5f59e3ce22053c9e27c21405a1a8f946bec07abdf99e05944f168cacbe3a74117f8dca77267a44eec8f5d4029c75e85d4fc36561caff7894d1c7d379

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ace86ae2209aea4e3349d7ccc1e4c20e

    SHA1

    fd715e6ef0304fdb4293be3be23c94a69148a350

    SHA256

    a8b9b8200d305fae45c6d3e19a4c4287d649ca578ecef1f4208643affdae4953

    SHA512

    94a91a2554422e78161ddb2a7b7a983e83dc2a2b12ce979ca510aff5001a267e7c5718d1de61e56a23d1cf00cba9eddb4bad85925ad155ad40742c367fc09bc9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e9d2937385f1bb58c6f7d5c83fc1f4f6

    SHA1

    2e8c87dd6787dc0f5842e4994a2e19ac59f7628f

    SHA256

    5030943801e5f7c86fff3817a66c956a6b033e8b1b4cdcf188ea5e16a9522b82

    SHA512

    e962d52103a4c0ff4e0862f616c31920c3cf9646912c40c1c932048abadbec8e0a7d63c627f60cbc5aaa08730f427329994ea9f1eb3dba4d521e6ab39f2a712c

  • C:\Users\Admin\AppData\Local\Temp\Cab343B.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar352A.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06