Analysis

  • max time kernel
    67s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/10/2022, 15:13

General

  • Target

    https://sfo3.digitaloceanspaces.com/ahmncms9shdfuhjpq62hs802/%3C%3E%29%21%260Nc%21%26%26/%26%21%26%210%26n.ah.%26%21%28%29.html#[email protected]

Score
10/10

Malware Config

Signatures

  • Detected phishing page
  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://sfo3.digitaloceanspaces.com/ahmncms9shdfuhjpq62hs802/%3C%3E%29%21%260Nc%21%26%26/%26%21%26%210%26n.ah.%26%21%28%29.html#[email protected]
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1156
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1156 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:4880

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    6a15e3564b9eb382fe5534f59d6fccb4

    SHA1

    911dbc1a988c2d6816beb0c21c4ea5402253b884

    SHA256

    6b478c66c9a2024177d4a478ccea9a82f3162aa87a5125a0dc3750c920bdbc62

    SHA512

    2801f46d495eed08dbb10e73ccda4828faf4ef6b1ff3ff45ce8d73331e692381c25417d15c958f8c3f9c6932300cd0e66b1aad6bb5a92e2bf27b338b6d245711

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    434B

    MD5

    121075bfd1fdecca2c1a6b8d741de3cf

    SHA1

    5828e68c41c1e7c08321f031b846ba52721ce17b

    SHA256

    67a75e9c63c4edcbb0c24a75414c3e189c3d1faafc402e1b0ecd4f21eb5a27f0

    SHA512

    331d07684584a695cef5a6044899c2da634f4267dba485b31e9efe491436fa01d1b88faa86b33781dbbb81e9b36656c1de082c8c19631f96a0bf2ade4aa897ae

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\ckj4gk4\imagestore.dat

    Filesize

    458B

    MD5

    c373d64495b8bef4e88b9ed5970521a8

    SHA1

    17dc358a66096793ec0566302f7a7c687069e168

    SHA256

    7f9b294660077f73a7dc7dfc8142c9d645f591def8c1db9566ab73d21a718ac5

    SHA512

    d6c918ee962437c77cb14dda909eed08c9e7defe13b23a122ced34f6e6a30b5af5fbada84015e38673a28efb7c29af81d0d8a3682a8db4082b9ef33744e3d888