Analysis

  • max time kernel
    131s
  • max time network
    132s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/10/2022, 02:47

General

  • Target

    https://aka.ms/LearnAboutSenderIdentification

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://aka.ms/LearnAboutSenderIdentification
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:808
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:808 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:4988

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

          Filesize

          471B

          MD5

          77a5fe334f666d4abee341d464457838

          SHA1

          0e31de696f343cf8565ec3de87a236a66a8b5d64

          SHA256

          bb07254543e22422027fa5f3c7af9e2b5a6b69bf6925fc1ecf128cb27e9a6dd0

          SHA512

          50cfe44a977775350ed5e98e39c21b2d43321eabd0f4dfbdcf2644f41d8c6fde9b96e480a34e4665c021a315f4db031e90f3d84cf46ebecc5161032a63da74d0

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

          Filesize

          404B

          MD5

          292eafefcbacbbfc31911821a45a2a34

          SHA1

          bcd23d3f60d8b4b316b22f112aad37671a06c248

          SHA256

          b42c47e9aa6c75890189c72a987d03fa7f8714260b347273e5122dcf5b01b33e

          SHA512

          7b3e4ed42f136945a48b749ba5aad4916a6dd609641b2274c21d0388dd09b3d40b5adf1830f1f7ef7c2ec3aa4f39e97e2c77c3a32721b838397f6c889ef2e83f

        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\z2evvp3\imagestore.dat

          Filesize

          771B

          MD5

          692c28f5b95d88140af57959a97c3e99

          SHA1

          2cd29cad1b1a9124ef5e4946afb70950e395bad6

          SHA256

          552262a2996e049cc458da4e8c2f8ad6dd2706e06d3040ff03e41329d8cc9d88

          SHA512

          febb9d83ab891cfcc0713957df4c04eb705279b5738dd8894baf6ea5ae28fa9bd03a7d939756082d10c1c67e2c98695bdea575a12349d19b62f441122b427f1f