Analysis

  • max time kernel
    91s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220722-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220722-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-07-2022 10:17

General

  • Target

    https://security.microsoft.com/quarantine?id=c91e49cc-40b1-4afb-0f1b-08da6f02c4fd\da4a765f-1d0a-5247-3958-bcc5587a7faa&recipientAddress=%40ENC%40KD7crAxNWpNia9cI%2FgN0doyv8jkQZlmTSJmJWRC%2FrUldKoOSuwIfHyPkyuMbNivHYJDT73cUpuAWXjIhrkerdwgjb3vQ6yIcgs78UuzTRDc%3D

Score
5/10

Malware Config

Signatures

  • Detected potential entity reuse from brand microsoft.
  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://security.microsoft.com/quarantine?id=c91e49cc-40b1-4afb-0f1b-08da6f02c4fd\da4a765f-1d0a-5247-3958-bcc5587a7faa&recipientAddress=%40ENC%40KD7crAxNWpNia9cI%2FgN0doyv8jkQZlmTSJmJWRC%2FrUldKoOSuwIfHyPkyuMbNivHYJDT73cUpuAWXjIhrkerdwgjb3vQ6yIcgs78UuzTRDc%3D
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:892
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:892 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:4168

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\wmsuct2\imagestore.dat
    Filesize

    18KB

    MD5

    eaeb785f98e0cc5560de99ac221f7ef8

    SHA1

    e3174ec948894ed62ad4daad8f27c9b794443b55

    SHA256

    59c8d535fde476cff3c397598e1b06dffee4a107e7989d541e22033d07641e7e

    SHA512

    c1cea6735bde9553ac6319506b5c596e63c329372575749b9bdd4116241f2fd9e961349cc30bd889a8ceae95a2be7d88f0a3a171bcd2ebdd51d23b5114033a9f