Analysis

  • max time kernel
    149s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-10-2022 15:59

General

  • Target

    https://www.docusign.net/Signing/EmailStart.aspx?a=1c618f3d-d2b3-4133-b2b6-2dc490c289c7&acct=b76041a9-42de-4c83-a80a-cd295cb004d5&er=cb31b637-3f4e-444c-9d59-a04a1ded3aab

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 5 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 27 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://www.docusign.net/Signing/EmailStart.aspx?a=1c618f3d-d2b3-4133-b2b6-2dc490c289c7&acct=b76041a9-42de-4c83-a80a-cd295cb004d5&er=cb31b637-3f4e-444c-9d59-a04a1ded3aab
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:536
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:536 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:4904
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:536 CREDAT:17416 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:4668
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:536 CREDAT:17422 /prefetch:2
      2⤵
      • Checks processor information in registry
      • Enumerates system info in registry
      • Modifies Internet Explorer settings
      PID:1116
  • C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe
    C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe
    1⤵
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2416

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_1DC6D7385EA816C957BA2B715AC5C442

    Filesize

    1KB

    MD5

    146888564b333429b8f5d412491c88c2

    SHA1

    12e3bbb1a6f40c51e29f77651cb2a9c79e6b0d01

    SHA256

    e12280800910d802764c4c48b76ec205e1e6a39fa099912b24cfdc694bce1906

    SHA512

    5d48cbb4c0aa19364a7a4d7e91f060eda0f6df4624b7949d23dfbe06586e762e2176764515916e4c389cf867311b6c1170a5b377bca08e7ed6d4046104418673

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    9ebd7a0345cc0e64adb3c109997a2c1a

    SHA1

    76ebba7d659452c2f3cd86b589dfd82fc73afddb

    SHA256

    43f974eae1ff849eb1ba9afc5c73ec9a5f1b32aa7c07c0f9124f9a320ac76ac5

    SHA512

    ebe08af1f17b7d31e388136734618c3a4f46433dca14bb95fa0cd8b7c80f543e09f42013d925bf7c872ab0ecd7d3b12a81f265bd6c486b189910722e052ed6fa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04

    Filesize

    471B

    MD5

    0c1e4e95b3acb0daf50d9092322f5392

    SHA1

    e38a9b2adc52b598ed9a697380f7729f083ec2f6

    SHA256

    7ff3940b32d2a4f7d7d2c23a5b04dc671361ec0ff7fc5066258f97ac685e08d1

    SHA512

    fa3ea83cfce0d2609958bef32903d363ce04fe1dd66fc1c0a5a326b3fa5d6cf83eea5caff8eeee7b3c1e77db7be42af636375546b0283483aaf388a99d0d8031

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_1DC6D7385EA816C957BA2B715AC5C442

    Filesize

    446B

    MD5

    5ad20a12b78e6a8ad92cbbc513f61ac3

    SHA1

    fda72956cdb98d0942cfad9c015ce59007dbbdb7

    SHA256

    c3a605368cac2fc4b4bdcd8ca8c280e26219609143679852f651c9fcc0384b79

    SHA512

    131f50db53bcc8e76c48427b374466f37dcd3604bf04836d0121da152d62efcdd069e7ed298c85ba38246a67c0b2bc08070cec340a5f995161cb200f0ed354bf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    434B

    MD5

    1f3f6d82f670adde3b12eadfab0047d0

    SHA1

    74696cf9794be09a85e06913509f02851658f89e

    SHA256

    41e5615246d4336c05d21293ba9b60e4f7bc1ee75b21ad55ae9bd6cde791b5d0

    SHA512

    f00517e51ee9ac2321e3a7fd4db4ca032e1b48c1eee655b46a2bd9826d8abf18d0caf2d90441c6d01ef07e4a6cd7f9b764ce892ac5f44d3d0d8ed1239ef97306

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04

    Filesize

    430B

    MD5

    78a7247208e04ff6c7d8e0a38231e14d

    SHA1

    3a64b13ed107121adad5e6de0c3f2eddb4624ca5

    SHA256

    f0517f556b51d91efa09239b26348ae0d07addad0fcd42cbcb092a20a3cc749c

    SHA512

    25425e3360ffd8ca306d56b5269369eaeeb98dfea1bb05ee63313e94a80e62ef42590e0e71fff95fd23b10f752a13d32b20e60881c287f0d9a6470e477e04539

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\ru1r3yf\imagestore.dat

    Filesize

    792B

    MD5

    c258c63e0896a2f81c2d93e6e5945fbd

    SHA1

    67bbd6271fea3bd3fb63edbacaa35cd59494a8c9

    SHA256

    da906b0ceedeefc0b324a04094ea4ecc55679347b782ccdce0218d4fcd46f509

    SHA512

    7c021ca6f1936c43d5b8e1d33e31bd17c756838af896c0525473f07dc67373a9e04dd296b76eb508c8e03b7a054da64ee41a22537b3d92e1a77bda3de01fbf69

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\ru1r3yf\imagestore.dat

    Filesize

    35KB

    MD5

    0472975eafff65e99321ba21932b5b0e

    SHA1

    14a2518d60f21d2deaca0c43ded08c5397f51878

    SHA256

    2346c68e615baf518114dc686845dc57619d971ec99241790a6b861bd3d85bcc

    SHA512

    b990f09d1696ece5fbe55223ef5c59af02a4285011bf8b28b206240db1b30937afec46ec97206accf8a0c0592f5aaeebeae1bb16b589e15d74a976a83363e655