Analysis

  • max time kernel
    68s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    30-11-2022 17:36

General

  • Target

    https://na2.docusign.net/Member/EmailStart.aspx?c=e4c9f2c4-6d9d-4470-9f43-04c011189875

Score
5/10

Malware Config

Signatures

  • Detected potential entity reuse from brand docusign.
  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://na2.docusign.net/Member/EmailStart.aspx?c=e4c9f2c4-6d9d-4470-9f43-04c011189875
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1228
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1228 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1712

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
    Filesize

    61KB

    MD5

    fc4666cbca561e864e7fdf883a9e6661

    SHA1

    2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

    SHA256

    10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

    SHA512

    c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    b57f87afd4f1fe734c4a72a0197f1478

    SHA1

    6392841228afe5de5fb173ae8eed4f3b8975f03b

    SHA256

    d1a322a5a5a8877a6ad97464991ab3968ef9a422f51b2a53a303e14115b391b7

    SHA512

    607603b6ab55f337544136f5ab5dcb04b015620da79a65b5bf4b263bad1ad7a0339c0184bf109cfc0f9d08433976e4204f334b6bc4e8143eac7dbc2ae63a867f

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\309axvf\imagestore.dat
    Filesize

    12KB

    MD5

    77d01accd7c11dd8383890b4e620d53b

    SHA1

    6dced0c5f2bdab74683c44ea582b845781ebe321

    SHA256

    3e4dfbc8cf213bc68262f83382a8e2dcb788daf594da7a0db753c3ce8333c2bf

    SHA512

    3183349941d5a4adecc57380d523c1493e335c81b4c0de8c5596499f6325b28fb098f18ead0a96d7b5e19802d0cd6640dd43245549545b5101b60f527c956ad8

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\309axvf\imagestore.dat
    Filesize

    28KB

    MD5

    2d52618d1cba686f78afc34c6798ae64

    SHA1

    c9af9d01bfe9295b33b55aaf0d9b9f6a400ae632

    SHA256

    c1f34ee1d089410f075268b1549d0e0e8cb97311087441748f35ffe13cac7a3d

    SHA512

    e415a7f83cf0cb8109ac0fea3aeffc58ad63b96489a121fd3628012accfc3e96b90a89e0d80abb229dca43b222abdbe22d73b21eeba52404cbe5d5c89a8ce92c

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\HQO1W0MF.txt
    Filesize

    603B

    MD5

    630337854b263b190ffa66652c8d105b

    SHA1

    cb3e898299854f2dac5ca7bdc2ad798cd6ba9456

    SHA256

    8da42b5f410510e1fc2c95337207219e833f5c56e6b17bf030278f3dc4d9fe6f

    SHA512

    ed73de851fcb7ba7fe5a52df994b161cf31462eee74a2791881b8f026dbb5d0888f4541d9f19d4eb0a5447497461ca81b07eba23cd05e637ad50e1edf98da314