Analysis

  • max time kernel
    123s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-20220718-en
  • resource tags

    arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system
  • submitted
    04-08-2022 18:58

General

  • Target

    https://www.frontrush.com/FR_Web_App/Message/MessageTracking.aspx?code=ODYzOTUxNTsyNjM3ODcyODtSOzgxOTc7TA==-f+lhm4TMRSg=&redir=http://3897.Ph6HvjsOnM.hmctech.com.br/?=carlos.delatorre@ambest.com

Malware Config

Signatures

  • Detected microsoft outlook phishing page
  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://www.frontrush.com/FR_Web_App/Message/MessageTracking.aspx?code=ODYzOTUxNTsyNjM3ODcyODtSOzgxOTc7TA==-f+lhm4TMRSg=&redir=http://3897.Ph6HvjsOnM.hmctech.com.br/?=carlos.delatorre@ambest.com
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1180
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1180 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:948

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    340B

    MD5

    92b92fd2c3da5dc0aafadd6dbb61ee30

    SHA1

    e9779f965fd7f8ffdf1b9d83ba53213c7c29c0d7

    SHA256

    b717c5b392b193a54560c7f2e6f7d1e102cfaedb5191b1694c70d53a94226f5b

    SHA512

    53b8f5fc26fe3601549230e37e7aa7073fe1276bc6afa5496bfb0e91ffa48ce25520eda9cd31b6266b2f1286ebfbc54e9be71c311483781bd12a38fdbefb091d

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\GLBXJ9MA.txt
    Filesize

    595B

    MD5

    06f92f1ebe3a88c3f2a2516b3600bcd2

    SHA1

    9881d6e77c04af80fe48e952996eebe8612e8b33

    SHA256

    4f5e297879a58bc2c0dccb92c65f7478a25d368dab0c52d63f6508856bfba39e

    SHA512

    df310573e9b9c7e5706a0cc97e85836696308028d06d4a5056be15314b6daa0769abaf8c01bf52a8d4c8ae99a9db1900a7bd82bb37339ffb5370b75bc92e1e90