Resubmissions

29-11-2022 08:46

221129-kpg9jsgb7x 10

29-11-2022 08:36

221129-khxewsff5y 10

Analysis

  • max time kernel
    74s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    29-11-2022 08:46

General

  • Target

    https://bafybeih6vtgmjz67sm64mteg7r2xblhbb27ej6xuwmbe7mdhqnplfsm36m.ipfs.w3s.link/ipfs/bafybeih6vtgmjz67sm64mteg7r2xblhbb27ej6xuwmbe7mdhqnplfsm36m/memzgeneral.html#user@domain.org

Score
5/10

Malware Config

Signatures

  • Detected potential entity reuse from brand docusign.
  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://bafybeih6vtgmjz67sm64mteg7r2xblhbb27ej6xuwmbe7mdhqnplfsm36m.ipfs.w3s.link/ipfs/bafybeih6vtgmjz67sm64mteg7r2xblhbb27ej6xuwmbe7mdhqnplfsm36m/memzgeneral.html#user@domain.org
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1092
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1092 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1944

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
    Filesize

    61KB

    MD5

    3dcf580a93972319e82cafbc047d34d5

    SHA1

    8528d2a1363e5de77dc3b1142850e51ead0f4b6b

    SHA256

    40810e31f1b69075c727e6d557f9614d5880112895ff6f4df1767e87ae5640d1

    SHA512

    98384be7218340f95dae88d1cb865f23a0b4e12855beb6e74a3752274c9b4c601e493864db777bca677a370d0a9dbffd68d94898a82014537f3a801cce839c42

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357
    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    e727a943e0815d5bf16a53bff53c0454

    SHA1

    f39eb90e5a8cf712bf182468109ecf0b92503e63

    SHA256

    27bc944b9b164457cfe740242bf5fe86dc04f554b524fe39e699ed82f56f29ba

    SHA512

    2afcbca7629ccb6fbb4dd4fd05240230f4ed5bb6c566663e1418deb351419f63f34e4810e2688bbb3f5d492a0d0ad3c9614665398a1deb2f770b6b3b6d6faf15

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
    Filesize

    242B

    MD5

    317ef9f9a7e1c6a8eadbabf4a6e98678

    SHA1

    98d3cef5e7d6c48c1c6d49f182047976b95ab1d5

    SHA256

    261b7a194138b242b0ae3ded292482c5dde9cad412495da560f49754c97558b3

    SHA512

    96c5ef795fd9a3e42a4dc7152172a24100e66957a089a8379b01bcd46c178bb2ec284039ad9f0bc3cc5baaf0b3ccbd39b770300c52b4bfe30336f4d9a5673549

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\lwrmjt1\imagestore.dat
    Filesize

    12KB

    MD5

    c3fe06b96d45e446ca297266494f6daa

    SHA1

    ad6717071f1c73d2efd6a627030178cc073d1a55

    SHA256

    2781a4ba7dc5204cb73d956d5b6fb9b52b325cf9722f1c6e89ca68ab48fa3956

    SHA512

    952987586fe6b8a10da5f093e2effcead81c670ff832d323c35ffd175d963d3d81856d42f9f96122192cf9daec2a4dab283d35106830b23774754643a73de441

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\4SNSKYDM.txt
    Filesize

    608B

    MD5

    505b014e5b73f526504bb1e7a1996972

    SHA1

    68bc9bb4d384399bccbe5a9a5a0b448798e88235

    SHA256

    4031ef25c469a271dbf7d0893b50c15905b5f5cba489493437b4d4077e7020c2

    SHA512

    a573c1b2b597a425d4260d23ebc5d732bf70eb6000b0bf4136748a10127280dc999768443e729ade32b021d40947ac6b6f90698639a27d2e93ce1aa8a6537778