Analysis

  • max time kernel
    133s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    13-06-2022 23:47

General

  • Target

    https://email.rinnai.us/e3t/Ctc/RG+113/cz1pB04/VVCX8d5fLScfW4BFygt7mRnXGW8_npSB4Lfk42N72QT-p3cf2kV1-WJV7CgDhKW8J36mK5WzC8GW7WQbkC3QS4C4W8H88zG7n495GW6BbYnf36CcZNVPYv6_8QfCMsW1rFgbf7jCCSwW70fCLY3fDbswW1Zz7Rr2yh40SW1p4tN_8wLpkgW87jsCW1xbFg0Vpn6s-6m8jKwW7hwdMw2zjv49W4cQBX32Dv9vKW44P7sj38_FPNW2TXzFx36MYR3VpP-qk5Z9YYkW82gD7g7fzCT0W1rcKkt58dZDcW2d8T919bk7K1W3kZm2B3QcQWBN5GcmbhC5GGxW8sXTRM2yntjMW5WBszN4tpKGHW2PW_fB2l3f-_385L1

Score
10/10

Malware Config

Signatures

  • Detected google phishing page
  • Modifies Internet Explorer settings 1 TTPs 50 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://email.rinnai.us/e3t/Ctc/RG+113/cz1pB04/VVCX8d5fLScfW4BFygt7mRnXGW8_npSB4Lfk42N72QT-p3cf2kV1-WJV7CgDhKW8J36mK5WzC8GW7WQbkC3QS4C4W8H88zG7n495GW6BbYnf36CcZNVPYv6_8QfCMsW1rFgbf7jCCSwW70fCLY3fDbswW1Zz7Rr2yh40SW1p4tN_8wLpkgW87jsCW1xbFg0Vpn6s-6m8jKwW7hwdMw2zjv49W4cQBX32Dv9vKW44P7sj38_FPNW2TXzFx36MYR3VpP-qk5Z9YYkW82gD7g7fzCT0W1rcKkt58dZDcW2d8T919bk7K1W3kZm2B3QcQWBN5GcmbhC5GGxW8sXTRM2yntjMW5WBszN4tpKGHW2PW_fB2l3f-_385L1
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:316
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:316 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1672

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    3414029bb9dcf3acdd7d54bd3b82cb30

    SHA1

    00ebfd7ad3778a49a9d112c732934043caaf3b91

    SHA256

    b4d8a1c1162f35c66b078fa09e9f7240d8f9feddeb4ebab79bea9b52bf55f537

    SHA512

    9fb6c0e8ca5c9f22f3d1cba055c74b4072bec847d0c91906c9a653f90c0808618205ea8e5b47507bf33fdb81790e1c5dcf1146ed3849c5ceed502fbcd26e796c

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\k007hrg\imagestore.dat
    Filesize

    9KB

    MD5

    2eb83066889e8973e550235a25ae40e2

    SHA1

    78062162a2bb8f23a53a6ed3d5e262bb28d68757

    SHA256

    2b0820cb03c9a45c28aab175328e75fb9519c0aed50d92f1ea5f56e0ccddc4b1

    SHA512

    178b2bdc63aab7993b6ef3023996cdb177b40ae849e4082efd45f808999b7552c09fc76e2d8e0cdf0f38ea614de490fb5b78055c91ff264866a6e403a34fd3e1

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\3QPMNJAG.txt
    Filesize

    595B

    MD5

    9ac808d82cc931adc4766162088a878e

    SHA1

    303ec2e0a5be7cd69a6a043655cc693e9445930e

    SHA256

    bd49c7d8e035ce5f7937c06a0056022f20cff0cdd240ba2f2aebb8f284ccacfa

    SHA512

    72f3764a2cf85c8c51b93461911566dbae5c62e92d6708157481aff9ab80bd8c61991fc47a20fe94dbe6e5bb20454596f55e3ed7ec29fadc1926a968aa379213