Analysis

  • max time kernel
    73s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    14-06-2022 00:46

General

  • Target

    https://email.rinnai.us/e3t/Ctc/RG+113/cz1pB04/VVCX8d5fLScfW4BFygt7mRnXGW8_npSB4Lfk42N72QT-p3cf2kV1-WJV7CgDhKW8J36mK5WzC8GW7WQbkC3QS4C4W8H88zG7n495GW6BbYnf36CcZNVPYv6_8QfCMsW1rFgbf7jCCSwW70fCLY3fDbswW1Zz7Rr2yh40SW1p4tN_8wLpkgW87jsCW1xbFg0Vpn6s-6m8jKwW7hwdMw2zjv49W4cQBX32Dv9vKW44P7sj38_FPNW2TXzFx36MYR3VpP-qk5Z9YYkW82gD7g7fzCT0W1rcKkt58dZDcW2d8T919bk7K1W3kZm2B3QcQWBN5GcmbhC5GGxW8sXTRM2yntjMW5WBszN4tpKGHW2PW_fB2l3f-_385L1

Score
10/10

Malware Config

Signatures

  • Detected google phishing page
  • Modifies Internet Explorer settings 1 TTPs 54 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://email.rinnai.us/e3t/Ctc/RG+113/cz1pB04/VVCX8d5fLScfW4BFygt7mRnXGW8_npSB4Lfk42N72QT-p3cf2kV1-WJV7CgDhKW8J36mK5WzC8GW7WQbkC3QS4C4W8H88zG7n495GW6BbYnf36CcZNVPYv6_8QfCMsW1rFgbf7jCCSwW70fCLY3fDbswW1Zz7Rr2yh40SW1p4tN_8wLpkgW87jsCW1xbFg0Vpn6s-6m8jKwW7hwdMw2zjv49W4cQBX32Dv9vKW44P7sj38_FPNW2TXzFx36MYR3VpP-qk5Z9YYkW82gD7g7fzCT0W1rcKkt58dZDcW2d8T919bk7K1W3kZm2B3QcQWBN5GcmbhC5GGxW8sXTRM2yntjMW5WBszN4tpKGHW2PW_fB2l3f-_385L1
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3872
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3872 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:2060

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    Filesize

    471B

    MD5

    3abc0a8790937f795a488ce6f4b010af

    SHA1

    1ec28317a7390b615073819cf32874e8c57e9d39

    SHA256

    027ba6cfa1664a9e34b02c0f81970a6feb213ec9b405c8488361ed23a9e1cb50

    SHA512

    f8a026477fa25c194825fbb4c9a470dffcf4a8b85f575128a90042b54c5c30b6aab1cd6f70625423b21c4383f1702124c838788f862cf3313e2088898198a4c5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    Filesize

    404B

    MD5

    607b3d466d71177fe71cd395acc7cbf4

    SHA1

    319acb11201a1662b1a282f6d7922dfbe1d3dd2f

    SHA256

    a3549d03c602178b25eb5a341e55dd5a6aa9475c0c81259dd998692d2e3e9f22

    SHA512

    11a1cbb51edabf6ae46e364632a01f05db56d271eccf9d332ddf5953a0669819fdd37383997196b09a55b918bbcaceede24469772bf100da256963874781b381

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\jnqp20o\imagestore.dat
    Filesize

    5KB

    MD5

    ecef9aeacc773c074c76903c60d5aeef

    SHA1

    9d9c54f02f409f278b2d686cfb1969042cf229f0

    SHA256

    f3ecbb3cab1f482c9a4cca3b225bacd247b20d872c9a2604164b20c8aeda3df0

    SHA512

    21046ccf611fa1cdd2c631b02feef7be6ee20e60cac1142088c8873428bd2d417688c2dbbef31200ffbef4587cfc0b9c17a7ae3bcc698d89674020915912055a