Resubmissions

23-05-2022 07:47

220523-jmzv5sfebl 8

23-05-2022 07:24

220523-h8l1qsfdfq 8

23-05-2022 07:02

220523-htwxdscac9 8

Analysis

  • max time kernel
    295s
  • max time network
    303s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    23-05-2022 07:47

General

  • Target

    https://go.pardot.com/e/984471/ail-paths-one-link-Fax-Outlook/8brb2/106206937/massimo.panchetti%40snai.it?h=Ho1v6XkzwFcBEcy6U-6lI_B6baHTlQy7tzJQVHZUz6A

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 17 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://go.pardot.com/e/984471/ail-paths-one-link-Fax-Outlook/8brb2/106206937/massimo.panchetti%40snai.it?h=Ho1v6XkzwFcBEcy6U-6lI_B6baHTlQy7tzJQVHZUz6A
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2036
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2036 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:1468
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2036 CREDAT:275504 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:1568

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_711ED44619924BA6DC33E69F97E7FF63
    Filesize

    1KB

    MD5

    d69e0688754ca34b5cb349fe5f221157

    SHA1

    ab341a7d908731585f981f9faea787778c60dbee

    SHA256

    ce1a716d5582174251790c3e4f513b5759354cd2690f005bfac96390c30e24e8

    SHA512

    15ba6681c549bef5ae03c9eda8e022bbee47056e186d010d30e6ee4eb7134f64427ec02ada6df4b329bd3f844761cbc8ec6a2baa63f0aefd2ac00a7eb6061260

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
    Filesize

    60KB

    MD5

    b9f21d8db36e88831e5352bb82c438b3

    SHA1

    4a3c330954f9f65a2f5fd7e55800e46ce228a3e2

    SHA256

    998e0209690a48ed33b79af30fc13851e3e3416bed97e3679b6030c10cab361e

    SHA512

    d4a2ac7c14227fbaf8b532398fb69053f0a0d913273f6917027c8cadbba80113fdbec20c2a7eb31b7bb57c99f9fdeccf8576be5f39346d8b564fc72fb1699476

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_711ED44619924BA6DC33E69F97E7FF63
    Filesize

    404B

    MD5

    99e42ea15355382b08b44c804468b40a

    SHA1

    76cc5341769fc4bd249a2dc07572b5d37ff3c7b5

    SHA256

    873aa845fea3f1ecc7f36b68063ee365a5c36f5287a86b2ebba232399e78c4e1

    SHA512

    8e336c026c1a3de0ebd944bd2325724e7b0b7515960bca1ba22e6f2b8217a4100a06a78f57a6b862826e81405880e46a62e68068d3fc241cba3597706cd011b5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    f963463a41b384a5eff2b981dffe007c

    SHA1

    55fbbf4bb36a1f3d4f4c446832dd73d774dbb23a

    SHA256

    14b170da2f0f87a54feff2ab45c2ee1d18f94e3ce9438d5c434701b43716b6b7

    SHA512

    173cf75f0fb113f1f521215b447c4c55ed3cef851c2edf815087114adc3661e0474c8ee7ce05203e079a02566cc9ad5cc55c2c4b5e5a364efce8e3b362de99a5

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\k007hrg\imagestore.dat
    Filesize

    22KB

    MD5

    f71cb88f1c88d5abe11291ccb2def57e

    SHA1

    ee05fe05060959d880c9cf020beffacb239bb972

    SHA256

    7d533945db12017ba0e299b565e9d4d70620043001cfd3c8e52c3d94c0e01b50

    SHA512

    03d433e567599bf529863993dfcae42e4f1b8ccd6db89354142d3334b2ef1b3b39cf822263a5198d44cf89b66d077c2cfe17b3c10d47b8678ad255c3419e993e

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\RIWX08ZF.txt
    Filesize

    600B

    MD5

    3dd1e865c1ca34a5009bdbb8c6c886ed

    SHA1

    534d5d22137a74f3fa0a60e784380e2a84153ec3

    SHA256

    a77087b9b8742597051d9badf942a664731c7987d5f6c5e8a99c5a85df38aa3a

    SHA512

    3c578b7b85d5b887cf18fb752fc0993df26509609bdc9945ca9806e2b9d64ac317556a6e2e2ffa9276802e4db94cca8d91b328e5282a7c5ab941731d2a9b3e97