Resubmissions

29-11-2022 08:46

221129-kpg9jsgb7x 10

29-11-2022 08:36

221129-khxewsff5y 10

Analysis

  • max time kernel
    115s
  • max time network
    195s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    29-11-2022 08:36

General

  • Target

    https://bafybeih6vtgmjz67sm64mteg7r2xblhbb27ej6xuwmbe7mdhqnplfsm36m.ipfs.w3s.link/ipfs/bafybeih6vtgmjz67sm64mteg7r2xblhbb27ej6xuwmbe7mdhqnplfsm36m/memzgeneral.html#user@domain.org

Score
5/10

Malware Config

Signatures

  • Detected potential entity reuse from brand docusign.
  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://bafybeih6vtgmjz67sm64mteg7r2xblhbb27ej6xuwmbe7mdhqnplfsm36m.ipfs.w3s.link/ipfs/bafybeih6vtgmjz67sm64mteg7r2xblhbb27ej6xuwmbe7mdhqnplfsm36m/memzgeneral.html#user@domain.org
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1708
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1708 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1496

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    fe8e0b5ea390db62cfb633b240ad030b

    SHA1

    f8700fb4508558e9c547878d77af76553a7fa710

    SHA256

    881b2df34a95e1c16e3aa522967392b0e909fbb9ed617001a73fb71ad0d697d1

    SHA512

    e5b7291d08a3a0cc14c419cb445ebe400d9f1fdd74dba40227a5c16b4bfda41e5f5cb903dd83cd9da92532af3ad362bca9ef091dc2a9a9b273d76d00c947f165

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\t9o3c8r\imagestore.dat
    Filesize

    8KB

    MD5

    3445ec0b8b7cafed5c7ad97f6063786d

    SHA1

    a2f359b71aa86078ad31b91af56a70c7d8f8d2b9

    SHA256

    22077cd995214fcadb22b69f289f053ae1f23991c0300439c8f6cd2fdd0cd7bc

    SHA512

    177afc3fbbd851026c30ef2edf21adda876619b7003baebc58bc311bf97384e86c5fc2fb231e65733639076bb7a1702a167ad551e9064be70c1d7d7d3c97afbe

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\3HS9EO13.txt
    Filesize

    608B

    MD5

    cf863899a24e28a5ed917bbf4c7f2f19

    SHA1

    d7a15e603437eac9f250e90bc506e6dab362d1d2

    SHA256

    fe9c184b95e6187e4774d45791d924589622d7a12bdf6c63eecf3d54084b83c6

    SHA512

    a25ae362d750042e63ddaf5646a3a3730920c1e60c61e4ce4a1a08803cd8d022d200b7cf26fc8cc78d08a6314d3aaf7ad7b35dc92903261ac54855cf63119839