Analysis

  • max time kernel
    147s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-11-2022 03:29

General

  • Target

    https://tmsnp.page.link/?link=https://Fivestarscaffolding.theasianexchange.com/M%20Eskaros/bS5lc2thcm9zQGZpdmVzdGFyc2NhZmZvbGRpbmcuY29tLmF1

Score
5/10

Malware Config

Signatures

  • Detected potential entity reuse from brand microsoft.
  • Modifies Internet Explorer settings 1 TTPs 41 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://tmsnp.page.link/?link=https://Fivestarscaffolding.theasianexchange.com/M%20Eskaros/bS5lc2thcm9zQGZpdmVzdGFyc2NhZmZvbGRpbmcuY29tLmF1
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:5068
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5068 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:3944

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    Filesize

    471B

    MD5

    dedb504b3469b24ec0df79c68f5772e2

    SHA1

    177a8b1045b456316ca32d90aba942bf34774c64

    SHA256

    e18111fd56db31f02eb16990f0bbc7991a0c80571703281ee66010e229c9f8b0

    SHA512

    101312fa01991caeaef010d0d21e740244cb3768490a1b82ae12e7524e50b6e7f2e23c08978ac4c373e9013baa0a8f50de8e1994341556b78ecd88ce13df5680

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    Filesize

    404B

    MD5

    e95d7a7e2155a684c716dda57a7272cf

    SHA1

    b391d45426ec6fd366135b174bac6e8fb73e9c23

    SHA256

    f19021578b66e36ac9091b3c12fea92c02e537decb1cc7cdb1b8af66ea852222

    SHA512

    2d9bb63971498bbb3621703e6f79888fc6d5040b2a533d1f4403eb2791380983c2cf18a2ed1dc651bda4df7c2e11ee5b6fc6998262fbdc6d085f2ca05ba06389

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\ckj4gk4\imagestore.dat
    Filesize

    18KB

    MD5

    9456110c1a1cca384e3c6d35fd633e65

    SHA1

    92fc91b28fb78d881bced8e58ec41025c5de00fc

    SHA256

    c031563a4b0905a1b923d4de24b619fd57cd1ef24e264490687befb20499624a

    SHA512

    0e026dff0c808cded6f454ed126a1e77c3121cede359d7be3ebaad9be2549059e4a3c68f239495ba1d83db088a1c1423dc56440cf650b4095104016c5d8d41ec