Analysis

  • max time kernel
    73s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-11-2022 11:27

General

  • Target

    https://cw-trk.zg8o.in/ga/click/2-64419424-3359-26729-52657-29545-48f6a13855-6272cddc3d

Score
10/10

Malware Config

Signatures

  • Detected phishing page
  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://cw-trk.zg8o.in/ga/click/2-64419424-3359-26729-52657-29545-48f6a13855-6272cddc3d
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3668
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3668 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1476

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    Filesize

    471B

    MD5

    2385a464e17980d978246b6b59a60697

    SHA1

    ee57c16c00972abbea042066dbdd769fdb89571b

    SHA256

    88dabd9b9c2183dd69b01146358783b0dc0e24faf044331be565cfd26e1dee2a

    SHA512

    d85eaa2a9a0a4523eb87bd43bbe995d8658dce705024c316de12c9f9be0277ded1646a6667bd47eed337e2b790aab9760ddf2e501242c42f3d66f40c23042d2e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    Filesize

    434B

    MD5

    c32ff8738ff48f3d800b1359af932709

    SHA1

    ba82493e83162c23ad92ed3c5cbcc38816956d8d

    SHA256

    dd94b2e1f0fd2bce9ebef7cb16e11f9ed7612e9baa861dab23ff99e74ce7cae0

    SHA512

    05f0c19369b1c4adce1bf992c785ccb5c5db1a19b23d8d5ae3a24f40eabe45c276a1e4c6fbc1095cdfe888fe8768761522add5b7409453ea4b26ef2e6c852d98

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\ckj4gk4\imagestore.dat
    Filesize

    3KB

    MD5

    26600d93c16c20c86f02f4b214b27efa

    SHA1

    5eb3afde556f716734045107d046de6122bd9320

    SHA256

    c14b3e5d7daa6025914c2a2d34acd0d788346e9762cece8520b175ed9c787eeb

    SHA512

    9f3bffdc295b9b2e05c05e66470048b89f587c7cc651254519bcac28f7cca30443a6c26099ed027ccfa66814f7bf8a2df5a0f4e8ba9898f775642d6a1cd22313