Analysis

  • max time kernel
    72s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-09-2022 06:21

General

  • Target

    https://falcon.crowdstrike.com/investigate/events/en-US/app/eam2/investigate__ip?earliest=&latest=&form.sourceip=10.125.111.255 https://falcon.crowdstrike.com/investigate/events/en-US/app/eam2/investigate__ip?earliest=&latest=&form.sourceip=10.125.111.255

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://falcon.crowdstrike.com/investigate/events/en-US/app/eam2/investigate__ip?earliest=&latest=&form.sourceip=10.125.111.255 https://falcon.crowdstrike.com/investigate/events/en-US/app/eam2/investigate__ip?earliest=&latest=&form.sourceip=10.125.111.255
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:976
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:976 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:4304

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    10220c349e6b662ccf862322bec4e542

    SHA1

    5791f2c0342aad353ae7e5c8d1a2aff1382504e9

    SHA256

    b30f79bd9b45578fa9858426c1fca5c15a600f54c97653982b767bbcf0b2b8aa

    SHA512

    543df1b315a192d0170c0083d3a30441a2d76d4ab8c92ea043d6612c7491555a0dd7f154fb9666339e13c3fe52bf42953b6906fcd0c9b62e5c6605d2a171eb80

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    404B

    MD5

    9fa38c24f938636aa2e92bf017dcf2c6

    SHA1

    a27558c91bdec85dded9019fafcf4ed2c8ee7856

    SHA256

    56bff211547d65cc366bc104c9705a07da7ac812ed30d924edefda367d0b1a5a

    SHA512

    3e7f83b90b509d5ea5b832f22326abe29f5f83b35e9fdbdf3cedec50818ee313ec4ba08291a8b7202e6820a81532037333a9ddd16992e1b843b875410bd18f33