Analysis

  • max time kernel
    105s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-11-2022 10:04

General

  • Target

    https://click.snapchat.com/aVHG?pid=apchat_download_page&af_web_dp=//amazonpc.ir/cp/AcZPYNny/gsajdak@evolenthealth.com

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 37 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://click.snapchat.com/aVHG?pid=apchat_download_page&af_web_dp=//amazonpc.ir/cp/AcZPYNny/gsajdak@evolenthealth.com
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3008
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3008 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2436

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    Filesize

    471B

    MD5

    2385a464e17980d978246b6b59a60697

    SHA1

    ee57c16c00972abbea042066dbdd769fdb89571b

    SHA256

    88dabd9b9c2183dd69b01146358783b0dc0e24faf044331be565cfd26e1dee2a

    SHA512

    d85eaa2a9a0a4523eb87bd43bbe995d8658dce705024c316de12c9f9be0277ded1646a6667bd47eed337e2b790aab9760ddf2e501242c42f3d66f40c23042d2e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    Filesize

    434B

    MD5

    2aa4790ae4e61890dfea0733c01f0a22

    SHA1

    22431f75de763a818dcf9c422bc07671392e3082

    SHA256

    6031759f0115e7e8964129f2d976ad0a3908de66931dce5f5811e60e66861e15

    SHA512

    aa6625551c1d89e6874d8c901370fd2d209a2fe96b090bf524b6cf018026f07eca926b49441875e9f47dc801388248d21f831540d339857a34fc4f69825151c7

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\ckj4gk4\imagestore.dat
    Filesize

    90KB

    MD5

    fd4b3396f5dfdd762abf730e43133166

    SHA1

    c6bae22cb0f3ab38245842310751c01058fe804b

    SHA256

    115006978778740a14214b344b9b0c764eead7ce968f35dfe4e5448c8e7f7d30

    SHA512

    87504c08b765ef90fe45cf070f9dcb9fa519e0e74e646b73f959cde0fc251e6f93efa18c7bb0e7fc816472ef8ce8ec40bddb18cdbac6314b9476ccade8d5622f