Analysis

  • max time kernel
    118s
  • max time network
    144s
  • submitted
    01-01-1970 00:00

General

  • Target

    https://www.ismyrotaryclub.org//Click/?_uid=800004603&_ctid=1972187&redirect=https://gy3tq.codesandbox.io/?af=Ym1vbGxveUB3eW5kaGFtLmNvbQ==

Malware Config

Signatures

  • Detected microsoft outlook phishing page
  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://www.ismyrotaryclub.org//Click/?_uid=800004603&_ctid=1972187&redirect=https://gy3tq.codesandbox.io/?af=Ym1vbGxveUB3eW5kaGFtLmNvbQ==
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3756
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3756 CREDAT:82945 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1372

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\75CA58072B9926F763A91F0CC2798706_93E4B2BA79A897B3100CCB27F2D3BF4F
    MD5

    e06bb2055b50cddf32580e1946d2c89f

    SHA1

    3a9d3114420f24445638b532d8dea26e2d4a0220

    SHA256

    6348a7f9805283d31d37664dbb9a2ed9b75e4860d7c30337214d79bc139bb29c

    SHA512

    c9a0c1b5b0e4e1be50e8670f93d06dd6d73b4d39882155ce6c2a2d3a8ea9bced2c77a78089c36661a3a6d9624cedf8104ae3ccf982098454189755cbcf46d3f5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B66240B0F6C84BD4857ABA60CF5CE4A0_5043E0F5DF723415C9EECC201C838A62
    MD5

    4468de15dd18dcdf7ef4b3971c8d3afb

    SHA1

    44da0ac6d3fe79e2dcad3b8345da6df286f982f8

    SHA256

    9bebbecd7699ef9441824ad950999b411cf51d02af35af97db5ebad10af0779e

    SHA512

    196be39966f55c333416375157f749f8fbe3fbda7f27c1008bf6b8ca0906dc12d6ab1c974b22d98012a1e8766c0ce7b31151acfe9a938dd4009430b448ddda62

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\BAD725C80F9E10846F35D039A996E4A8_88B6AE015495C1ECC395D19C1DD02894
    MD5

    115135090375ce11e830f02246064e12

    SHA1

    7433b7272f89d0db71c4b08ebdaca908ef330d07

    SHA256

    9fb5073955f1640b556540c028a848487c868e915ead8abab1ebab1985c8731d

    SHA512

    b8a06bc7826d076831c9b5a41506df533bb59e0a6cb2e1f1bfbfd5026221ea307a44712513578d3ac11dbee5988f02887ca6ba09c9771fad3cbf4ffcdb7ce34d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\FC5A820A001B41D68902E051F36A5282_961E84E8253776F56FED44E0F7E5258A
    MD5

    cf330544032b9f3f661b2632f3a6eeca

    SHA1

    bcf35e63ac49aff5f1e785942119959bcc6794e5

    SHA256

    54e9fe5312eb696a6137e535b7584c7634a4afd5105e3843dd0ac54da332b53d

    SHA512

    10231ad50dc2ee73231934b1cc4dea38ef687139e363dffdf9891f5947608867208d326bbd88eb18ec4d95bf1edf0622427009e803b49d29cd4408127bed7689

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\75CA58072B9926F763A91F0CC2798706_93E4B2BA79A897B3100CCB27F2D3BF4F
    MD5

    129975c57ddf202b01be3ed997b32d0f

    SHA1

    f763863eb2cdf8e2a80a8b9f64d724a1c212dbd1

    SHA256

    c6def6b3c47d021a6710bca3eeedb9a75b61dbad39f2aa4420536a4d84ecae4f

    SHA512

    7758a6071850e9ca5eadc8f7ab1aa0a21102b81deafb7ee4743865e549196dcc487626f4c98d975044eb3a954f0943425abc86b762552e4f1d05d518e5ea0711

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B66240B0F6C84BD4857ABA60CF5CE4A0_5043E0F5DF723415C9EECC201C838A62
    MD5

    59b9ecfc2261748d997da534c8aeea51

    SHA1

    9396b14e2844606d245d26be8e2345f62c32cf8a

    SHA256

    11329300cd09dcc50250a453f76c31507a16b22ea4e52620f505a9735a4aaf0a

    SHA512

    8bbe4a3a847157511b46dbbb9337eed75b922726353f172c491c0c71276a52d9b746f3d570af1fb845301654a8c3ec863eb4d90f4d0e89c4dc3b5c5ef5115f3a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\BAD725C80F9E10846F35D039A996E4A8_88B6AE015495C1ECC395D19C1DD02894
    MD5

    7c4274a4573931a12cc2842301fffd0e

    SHA1

    a69cb59cfb6b6b2b9c9c891949c969af8115cc9a

    SHA256

    b1b9f038db04d19333ba287d40889f2e3ee9439b2a8cd0c4251358b959ba1827

    SHA512

    be5524d56ee3e0743b45fc6ff1a3b6faab80217c4babb65065cfe7902f989bfe7df690fc71c78b00350c90e569bd46ebd4c3df5eeace65ee5ba5c997bacf910f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\FC5A820A001B41D68902E051F36A5282_961E84E8253776F56FED44E0F7E5258A
    MD5

    67d45f30ffdbc0d2ae76d37e423373a8

    SHA1

    8296179474ac6fbc90776501ab96062ad6388706

    SHA256

    8ea4a90210fb5dd78925117c469b6ff5f532e9216d83549c8461a2dbc75b9da6

    SHA512

    9c9ea8d410966166ba5c0aabf20ae4497fbab5ea6891dea9f93f659891f836a5157912bd2a3e658a87d6803f7339c9e117926046a642d58293af956de97fdc85

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\PPS17VGV.cookie
    MD5

    2c72b39c4999d171a9b06bb3c229c9bc

    SHA1

    03485a90da0ac8d0e8359e04b89603cb86fa0ae4

    SHA256

    e110fc70eb7a94dbc6c35fddee73af25486796818ff551d944418b436cbd2705

    SHA512

    35f72f275bb4778bfd7dec87b14dbcaf4ca58ac1ad14ffc28d58baa517147e262e372f54458bf1bc8a41818f807e4388736fb74cefd9b324275561451005df0d

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\SDRRFT34.cookie
    MD5

    a6868834620f6912fa6ed0a15d01e104

    SHA1

    2504b75696d615650a6bd94eb83649132fb5b1a2

    SHA256

    84e0d3942f3db65213e7f06128a2607a54bf5a584be16c1fef0d96decb4931b8

    SHA512

    235a6ca0556f66111c1519bbcf05ac1d801320918e6e3b0521f25f3f28092f6779c6cb84449087481d260f6d89505266e0247d0a7c347b6faaa52337f5bc6dde

  • memory/1372-140-0x0000000000000000-mapping.dmp
  • memory/3756-142-0x00007FFE0D270000-0x00007FFE0D2DB000-memory.dmp
    Filesize

    428KB

  • memory/3756-151-0x00007FFE0D270000-0x00007FFE0D2DB000-memory.dmp
    Filesize

    428KB

  • memory/3756-123-0x00007FFE0D270000-0x00007FFE0D2DB000-memory.dmp
    Filesize

    428KB

  • memory/3756-125-0x00007FFE0D270000-0x00007FFE0D2DB000-memory.dmp
    Filesize

    428KB

  • memory/3756-127-0x00007FFE0D270000-0x00007FFE0D2DB000-memory.dmp
    Filesize

    428KB

  • memory/3756-128-0x00007FFE0D270000-0x00007FFE0D2DB000-memory.dmp
    Filesize

    428KB

  • memory/3756-129-0x00007FFE0D270000-0x00007FFE0D2DB000-memory.dmp
    Filesize

    428KB

  • memory/3756-131-0x00007FFE0D270000-0x00007FFE0D2DB000-memory.dmp
    Filesize

    428KB

  • memory/3756-132-0x00007FFE0D270000-0x00007FFE0D2DB000-memory.dmp
    Filesize

    428KB

  • memory/3756-134-0x00007FFE0D270000-0x00007FFE0D2DB000-memory.dmp
    Filesize

    428KB

  • memory/3756-135-0x00007FFE0D270000-0x00007FFE0D2DB000-memory.dmp
    Filesize

    428KB

  • memory/3756-137-0x00007FFE0D270000-0x00007FFE0D2DB000-memory.dmp
    Filesize

    428KB

  • memory/3756-136-0x00007FFE0D270000-0x00007FFE0D2DB000-memory.dmp
    Filesize

    428KB

  • memory/3756-138-0x00007FFE0D270000-0x00007FFE0D2DB000-memory.dmp
    Filesize

    428KB

  • memory/3756-141-0x00007FFE0D270000-0x00007FFE0D2DB000-memory.dmp
    Filesize

    428KB

  • memory/3756-122-0x00007FFE0D270000-0x00007FFE0D2DB000-memory.dmp
    Filesize

    428KB

  • memory/3756-144-0x00007FFE0D270000-0x00007FFE0D2DB000-memory.dmp
    Filesize

    428KB

  • memory/3756-145-0x00007FFE0D270000-0x00007FFE0D2DB000-memory.dmp
    Filesize

    428KB

  • memory/3756-147-0x00007FFE0D270000-0x00007FFE0D2DB000-memory.dmp
    Filesize

    428KB

  • memory/3756-149-0x00007FFE0D270000-0x00007FFE0D2DB000-memory.dmp
    Filesize

    428KB

  • memory/3756-150-0x00007FFE0D270000-0x00007FFE0D2DB000-memory.dmp
    Filesize

    428KB

  • memory/3756-124-0x00007FFE0D270000-0x00007FFE0D2DB000-memory.dmp
    Filesize

    428KB

  • memory/3756-155-0x00007FFE0D270000-0x00007FFE0D2DB000-memory.dmp
    Filesize

    428KB

  • memory/3756-156-0x00007FFE0D270000-0x00007FFE0D2DB000-memory.dmp
    Filesize

    428KB

  • memory/3756-157-0x00007FFE0D270000-0x00007FFE0D2DB000-memory.dmp
    Filesize

    428KB

  • memory/3756-163-0x00007FFE0D270000-0x00007FFE0D2DB000-memory.dmp
    Filesize

    428KB

  • memory/3756-164-0x00007FFE0D270000-0x00007FFE0D2DB000-memory.dmp
    Filesize

    428KB

  • memory/3756-165-0x00007FFE0D270000-0x00007FFE0D2DB000-memory.dmp
    Filesize

    428KB

  • memory/3756-166-0x00007FFE0D270000-0x00007FFE0D2DB000-memory.dmp
    Filesize

    428KB

  • memory/3756-167-0x00007FFE0D270000-0x00007FFE0D2DB000-memory.dmp
    Filesize

    428KB

  • memory/3756-168-0x00007FFE0D270000-0x00007FFE0D2DB000-memory.dmp
    Filesize

    428KB

  • memory/3756-169-0x00007FFE0D270000-0x00007FFE0D2DB000-memory.dmp
    Filesize

    428KB

  • memory/3756-121-0x00007FFE0D270000-0x00007FFE0D2DB000-memory.dmp
    Filesize

    428KB

  • memory/3756-120-0x00007FFE0D270000-0x00007FFE0D2DB000-memory.dmp
    Filesize

    428KB

  • memory/3756-119-0x00007FFE0D270000-0x00007FFE0D2DB000-memory.dmp
    Filesize

    428KB

  • memory/3756-117-0x00007FFE0D270000-0x00007FFE0D2DB000-memory.dmp
    Filesize

    428KB

  • memory/3756-116-0x00007FFE0D270000-0x00007FFE0D2DB000-memory.dmp
    Filesize

    428KB

  • memory/3756-115-0x00007FFE0D270000-0x00007FFE0D2DB000-memory.dmp
    Filesize

    428KB

  • memory/3756-173-0x00007FFE0D270000-0x00007FFE0D2DB000-memory.dmp
    Filesize

    428KB

  • memory/3756-175-0x00007FFE0D270000-0x00007FFE0D2DB000-memory.dmp
    Filesize

    428KB

  • memory/3756-179-0x00007FFE0D270000-0x00007FFE0D2DB000-memory.dmp
    Filesize

    428KB

  • memory/3756-178-0x00007FFE0D270000-0x00007FFE0D2DB000-memory.dmp
    Filesize

    428KB