Analysis

  • max time kernel
    77s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    24-05-2022 14:59

General

  • Target

    https://storageapi.fleek.co/107a9ff1-1673-4b62-9006-b34d4ca94dbb-bucket/black/index_black_gen.html#events@events.blackrock.com

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 35 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://storageapi.fleek.co/107a9ff1-1673-4b62-9006-b34d4ca94dbb-bucket/black/index_black_gen.html#events@events.blackrock.com
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3000
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3000 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:4908

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    Filesize

    471B

    MD5

    3c94b790a4d3d3813b9804b360811c02

    SHA1

    9b42bca99be723330c45b22abb0698f77ef8077a

    SHA256

    7bc88a561babff736195edc916e12556d4a870e9dc94e649adff7d6859468d93

    SHA512

    594410b019fde2552e456bf87934eab332c73d5a1c73c3fac27886bb2c8f2b2c174acb0fa5f67b40a4b41339cff713b239eab680c6dd7aab00aacaf8e38538b8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\82CB34DD3343FE727DF8890D352E0D8F
    Filesize

    7KB

    MD5

    5c1113b7526a7723b64400d44129fa78

    SHA1

    af1b7813ad3e00d4699e5514a77984d5b423b757

    SHA256

    9ecc27c740862ab2712da2c4ff31592e2c0a8643576e64551ee344a73fbe2494

    SHA512

    4b47b9886884bc1eb0651c53eb1805922b2889d42076665bbd9f4b818d54c1bc86956e79cdc254c847b83640373b22a77f9bed9987fbd58c9104bca807a2d2d7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    Filesize

    404B

    MD5

    1c26ca02e3601fa2ce7d08ff5bd53d0e

    SHA1

    9402c62a6745140795623445d00552838a3a3c5d

    SHA256

    174ff4c2989625342d99ee7feb08290803a48bdc7ba259af97a43996cf301f09

    SHA512

    b581f202571936be56d21341f1a0d2592ddac1c3511f3666f404c6b6841f3778afc5d84904bc69cac33f7a446cf018069cd1839e2c3dc9d6219d5e20f2d5973b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\82CB34DD3343FE727DF8890D352E0D8F
    Filesize

    226B

    MD5

    cec01fdae1a49820201441727aabed3e

    SHA1

    ddb15f6074d3e37496db2e89f0dd40abaac77542

    SHA256

    e12bd00ce75e3ab2b29124616db33c6083b6ca535cdad2e91553e2265dae8071

    SHA512

    179a743256a4a8be7f4b7f10bf18dde31147595f11b5a69b11afd6d3195e0713387c7817f5738bc5e825e9359fb8e2f65342ed1102848ddda8effa9352ff6300