Analysis

  • max time kernel
    79s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-12-2022 20:20

General

  • Target

    https://www.yammer.com/jddealers

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 51 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://www.yammer.com/jddealers
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4300
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4300 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:4732

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    4be9ab121a39e812723996e08985a451

    SHA1

    c86edb51927e78ad75ac6273e287a4187f54b8ee

    SHA256

    db88db8fc754f8e979b7061497f98362bdf7c15984f402fe90586983f88b0b2e

    SHA512

    d8cd3a478546529741f1c8e7465014f3ce906994e94a5c8fd55167d6813c73841ece72c98d5212a23282633f841b9d13107954aae4a5256d66a9235c7caaf8b2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    434B

    MD5

    a8a058f2020617c26776ebffaea8063a

    SHA1

    0ed6d5038d0064a7fa4e6092a88adb8c4358f46a

    SHA256

    410eb255f78003fd18a9c305a68faf33083f4ddb396fc016d6fd00a27034f057

    SHA512

    36a25f22ebb5b2b507bf01de2dc3ca6ab3209d7a01f7f8893c44651a2732f006b5f5d95b5ef482974ab488f0bc61ab675b0cb22c8ccf0e7f4812a00908b8f103

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\xyoggsx\imagestore.dat

    Filesize

    5KB

    MD5

    7c56c198eb4bdfc4ac1b2402b97c803b

    SHA1

    477a2ed0c87ee017f7b9c9ccdabd9e8d03f9460f

    SHA256

    484f2f309fa3c17719ba2a312ccaf71f0355268f825079d27af6dae15c28cec7

    SHA512

    3963944898291b7cbb27193e14d9abc2806339d572a60a19f8a2d32c592a08e1fedfdf46345921a69cdce3905dfc92e79f947364aef80c470e88d161156d4dd7