Analysis

  • max time kernel
    73s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-10-2022 13:07

General

  • Target

    https://southindiar-notifyp.svc.ms:443/api/v2/tracking/method/View?mi=1WmYmqm4B0i9CHvOdsvtZQ

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://southindiar-notifyp.svc.ms:443/api/v2/tracking/method/View?mi=1WmYmqm4B0i9CHvOdsvtZQ
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:864
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:864 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:3880

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_1DC6D7385EA816C957BA2B715AC5C442

    Filesize

    1KB

    MD5

    52273316f21c9f6f356568f6f27fe4e7

    SHA1

    47ee3ff1112e27fce08a5e16c3e74d95f33150a5

    SHA256

    85c5578d4eb028a4204d59dc4b7672ea70a9233959594cd93fd61ce592fc7df8

    SHA512

    8f1c4ef065f8c22a58dbc26e43f89cb8487fdb1d2c20c72e0692fa590c951be543f118df4c316015ee44a3fc32e3221b839a703db67c4bb11835cd7762c12dd6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    814a08d516045778f799a5c6407df23a

    SHA1

    81eac45a1e09f375443bfe5f8bda934afd9f30f3

    SHA256

    8caef6d991ca56a10ceb809856757cd5eaaa118473650f31e9b5f5909bd317fe

    SHA512

    e22808557d2a8182ef2a6662edc3f5f022eb1efad3702e708f86c4b9a25bf62a8bf1e84bbbd1c3575d4715588d797af0fee6d5ef8e913f0deb8fdacc80f335c8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_1DC6D7385EA816C957BA2B715AC5C442

    Filesize

    446B

    MD5

    a58110313799c91cf2e346f57e2b7901

    SHA1

    882801d54e6d81ca74c583c40b3c5f1e68955673

    SHA256

    9e72d13e0bb02e3139503c0fbab84ff384b8109c6cb5c24d51ef466d5f212fac

    SHA512

    c7a856936d06cc0497d2de64ce32946b8a3949290862b1c0317245829cc9702026997d57270ce10ed6da6efa19262f892b017a01a7583be73230b19c620609de

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    434B

    MD5

    68e70321ae9ce80094b0061a872e7ef7

    SHA1

    b34e627800270e77614b1fd1cc9255d1e3395b61

    SHA256

    6641d94e7523cc57995aa32479df1d497e447203c6d8795f9c0f25c4c0366e43

    SHA512

    6c92079770c43f25079dfda40e007e6bcc319a81fee37f1b905a37b08ce95b31c5c8280817cea78c66cd435b6de8d813c608a862de96186bdc996c7779ca3105