Analysis

  • max time kernel
    136s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-11-2022 10:02

General

  • Target

    http://39qilwa.companyprevent.co.in/235256643562325363523763622/ib-redirect/fvhesmlqirbwst3sou2xi2rrhbiwgm27?_branch_match_id=1126077571259515928&_branch_referrer=H4sIAAAAAAAAA8soKSkottLXzyo0rDLSSywo0MvJzMvWd0q28Mh2MU7KLksCAIt9EvMiAAAA&utm_medium=marketing

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http://39qilwa.companyprevent.co.in/235256643562325363523763622/ib-redirect/fvhesmlqirbwst3sou2xi2rrhbiwgm27?_branch_match_id=1126077571259515928&_branch_referrer=H4sIAAAAAAAAA8soKSkottLXzyo0rDLSSywo0MvJzMvWd0q28Mh2MU7KLksCAIt9EvMiAAAA&utm_medium=marketing
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:800
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:800 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:3184

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    dedb504b3469b24ec0df79c68f5772e2

    SHA1

    177a8b1045b456316ca32d90aba942bf34774c64

    SHA256

    e18111fd56db31f02eb16990f0bbc7991a0c80571703281ee66010e229c9f8b0

    SHA512

    101312fa01991caeaef010d0d21e740244cb3768490a1b82ae12e7524e50b6e7f2e23c08978ac4c373e9013baa0a8f50de8e1994341556b78ecd88ce13df5680

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    434B

    MD5

    8154332932b9ec3341b9286c94fd5bbc

    SHA1

    884668103032f02303f7b829b22afc0504b12bb1

    SHA256

    2e3028c7b575f365d8d295653993e3d32ea64309ed7f09fa8bb926c0e98cba51

    SHA512

    b83a6cac0488402cb907f9010d5533f5002dd42df627fb69df94d055192a6530229db2be1d1403e746572b66acb849f1fc54a3ab25ca4e6e86211881599799f1

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\z2evvp3\imagestore.dat

    Filesize

    5KB

    MD5

    c9dc43a0425dde8addf2981a86e8bb24

    SHA1

    df4a5b5c194e42ee7803ebfaca18b6cd726b188e

    SHA256

    54378f2b78252cf2aea97f16b24a04ae4e5ae7eb05b3899cd99a72e5297e6b00

    SHA512

    28e38da60a60bd6995118a58c79fe941f488b0f1b1fb71b5cffdeae9719397e42acdb90dbab29f5fe674c677f982c0f0e961b81c7443b7ba9aad1c1662944094