Analysis

  • max time kernel
    150s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/10/2022, 11:24

General

  • Target

    https://stackoverflow.com

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://stackoverflow.com
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1884
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1884 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:3492

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

          Filesize

          471B

          MD5

          afc3e2584b32e1e7c23c33e9534089a5

          SHA1

          ea4e2266d010c300621d2287ea60fe3e9a9ee753

          SHA256

          61597f5f937da250a5ed7b4b82867bebc546a5a35c0029982a003b1e9cbd2e7e

          SHA512

          f0e0d20b15bc390292baf0d93d982315afc466ccd2d4e48152ed65af97aed573d5b9e65b2b50925cbcd2e736955dfec4f63de5739cdb1499eb2db5dfc3cc4fe6

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

          Filesize

          404B

          MD5

          5c65da6aaec3d57ada85fd7b0fff6e2c

          SHA1

          9a4becfeed1eb0bb7d15abb1a32c0b990570c02d

          SHA256

          f965d79c86cd6d9a27f5092b0cfe456f8c98a3470a1081c281975cbeed95230b

          SHA512

          b4753da385c5db035d2d71cb8913702bd19445acb35e4f074c55e5e59e88f94b216bda5313d8d2bba707aa81bbe1b86c6e8c885a1add5ce465bd2809a4399566

        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\ckj4gk4\imagestore.dat

          Filesize

          5KB

          MD5

          00bab7452e570646e45a39c0c2ce2c37

          SHA1

          a550f5f1367d6a0556ca681ea18bb311749db3e2

          SHA256

          db9fb65cc2c9a0b9fe95f445fffd0397623f0a43b54e4cb2d35f3213e4f0ebf4

          SHA512

          490b44acba9d5d6206a63068d4222eb1e35cf84acb6f3ca6c4cf5950ee84c51e12ba0de103dc15db72320b51e784623b2a5d02d50f64a34d5b7f58906506c749