Resubmissions

18/10/2022, 01:25

221018-btf3lsebgp 1

18/10/2022, 01:23

221018-bsbfqsdhf5 1

17/10/2022, 09:00

221017-kyevsabca2 9

17/10/2022, 09:00

221017-kyaaasbbh7 1

17/10/2022, 08:48

221017-kqj5jabbd6 8

17/10/2022, 08:37

221017-kjge3abcer 8

Analysis

  • max time kernel
    73s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/10/2022, 09:00

General

  • Target

    http://we.tl/t-7si6bGYMbk

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 43 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http://we.tl/t-7si6bGYMbk
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:5092
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5092 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:4688

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    a1fa0003a52ebb324daef7beffac914a

    SHA1

    05a4f39bebde05937dfefcddb4eaf3c6934a3216

    SHA256

    00fd170b5c3ca6ff33acc4ca1ae96f14000aca8692f038d639793eeb4881cfb2

    SHA512

    470ba58cf873bb1b0e34c7f8f7f73a80c842807e5d1bb2520fbe2dbf6f5bde0f7c911af9c4c062be16c128e2a24bcc4bf81244f5ec7fbfc4287a30136848536f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    434B

    MD5

    fefe6ee25f5fa62a202f0d3c4a20b6b1

    SHA1

    69bc05bb13ace59295c2dfa0c6998e92ed721605

    SHA256

    43747577d4f605353b435bc45e6db70a26c8796dfd46a8296602d8f6f5f78ffe

    SHA512

    69762c16b44ce6467ae460166a6c3b5e95f0de05e9650af25fb604fdd51e1fe8f823a8727059b14880bed7570343408ed68856643d59208cd76b85be823c8ba6

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\z2evvp3\imagestore.dat

    Filesize

    41KB

    MD5

    e71b4a0e68603440475ea8717915d9ce

    SHA1

    13acaf5432312b7002e96c07882036cde228d88d

    SHA256

    c414cf247ff28793ce4d5c61a9a83f8639b83a5d287920fa5e4fd8f7c3908be8

    SHA512

    81af1d854b906a064001aad321bb94d4fd14b63e6f8f060b92463d74ca3548e7e6d5dad46fe8540f344b29a0981c0a28a0af0fc33b3f5d8329e8b7612f569f59