Analysis

  • max time kernel
    153s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    13-06-2022 23:47

General

  • Target

    https://email.rinnai.us/e3t/Ctc/RG+113/cz1pB04/VVCX8d5fLScfW4BFygt7mRnXGW8_npSB4Lfk42N72QT-p3cf2kV1-WJV7CgDhKW8J36mK5WzC8GW7WQbkC3QS4C4W8H88zG7n495GW6BbYnf36CcZNVPYv6_8QfCMsW1rFgbf7jCCSwW70fCLY3fDbswW1Zz7Rr2yh40SW1p4tN_8wLpkgW87jsCW1xbFg0Vpn6s-6m8jKwW7hwdMw2zjv49W4cQBX32Dv9vKW44P7sj38_FPNW2TXzFx36MYR3VpP-qk5Z9YYkW82gD7g7fzCT0W1rcKkt58dZDcW2d8T919bk7K1W3kZm2B3QcQWBN5GcmbhC5GGxW8sXTRM2yntjMW5WBszN4tpKGHW2PW_fB2l3f-_385L1

Score
10/10

Malware Config

Signatures

  • Detected google phishing page
  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://email.rinnai.us/e3t/Ctc/RG+113/cz1pB04/VVCX8d5fLScfW4BFygt7mRnXGW8_npSB4Lfk42N72QT-p3cf2kV1-WJV7CgDhKW8J36mK5WzC8GW7WQbkC3QS4C4W8H88zG7n495GW6BbYnf36CcZNVPYv6_8QfCMsW1rFgbf7jCCSwW70fCLY3fDbswW1Zz7Rr2yh40SW1p4tN_8wLpkgW87jsCW1xbFg0Vpn6s-6m8jKwW7hwdMw2zjv49W4cQBX32Dv9vKW44P7sj38_FPNW2TXzFx36MYR3VpP-qk5Z9YYkW82gD7g7fzCT0W1rcKkt58dZDcW2d8T919bk7K1W3kZm2B3QcQWBN5GcmbhC5GGxW8sXTRM2yntjMW5WBszN4tpKGHW2PW_fB2l3f-_385L1
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:964
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:964 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:904

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    Filesize

    471B

    MD5

    3abc0a8790937f795a488ce6f4b010af

    SHA1

    1ec28317a7390b615073819cf32874e8c57e9d39

    SHA256

    027ba6cfa1664a9e34b02c0f81970a6feb213ec9b405c8488361ed23a9e1cb50

    SHA512

    f8a026477fa25c194825fbb4c9a470dffcf4a8b85f575128a90042b54c5c30b6aab1cd6f70625423b21c4383f1702124c838788f862cf3313e2088898198a4c5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    Filesize

    434B

    MD5

    c5583723b28ed0808f3ad258d8d71c1a

    SHA1

    d02c9bd4e8723e7d6a6c363ee92a109d7a563e0d

    SHA256

    79dee539856b5cef49abb8ee483187fca7a5bf65388f0d99f446e0d62c64923c

    SHA512

    00bd64d6c5b4027a453e813afe1ac2fabfc5f1527e91a6e44637900b4d205929630ddd11c663dcd9bacea2627973ecc587f8410582eae95bd8820d43f186edcf

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\2klo80q\imagestore.dat
    Filesize

    5KB

    MD5

    b14755f29ebb6e6b704202388a02352a

    SHA1

    261ca6dc6fcb09a6200431cb7d2174beb5278dea

    SHA256

    166ea79710d68f451bf0e001a299bce05f7a53e594b11a430249c5d15679d014

    SHA512

    593c5e9bde4833d33088f64187a94069c96f9da7b4b45d55fb6f460e243df9c5451ba92ec43da969f9aa68c27a5911dc7b1f2d922f05c3c327987cf3eaa54710