Analysis

  • max time kernel
    74s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/12/2022, 18:02

General

  • Target

    https://storage.googleapis.com/short1/koinyeufuhemail.html#TFZVWDdoYkIxVit0bkx3Wi9SYzBGL1FoRWhqSEl1eUpacEMvMUxlN0IvSzJRNk5Kb2ZhK2JBcXdqaEU4cTd1VFJxMlBScEpjTHRkM1FnZkU5NkQxTFE9PQ__

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://storage.googleapis.com/short1/koinyeufuhemail.html#TFZVWDdoYkIxVit0bkx3Wi9SYzBGL1FoRWhqSEl1eUpacEMvMUxlN0IvSzJRNk5Kb2ZhK2JBcXdqaEU4cTd1VFJxMlBScEpjTHRkM1FnZkU5NkQxTFE9PQ__
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:5056
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5056 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:4228

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\82CB34DD3343FE727DF8890D352E0D8F

          Filesize

          7KB

          MD5

          c242c05b8559b6e2b3b6d0de69134328

          SHA1

          c1588ce38ed00b526805bb80c0424313cf5fda88

          SHA256

          5e5d49ce2141febc4db7b10f89f146b3457f03a140dbccdadd853a1861ba3d0c

          SHA512

          7c44a55e71d751e1e9ffa628b2beb72cecfd355a2228ee5abfc22755d716de38f6cb4ede523ccbd3f575ff2001053a1abf7435dfde50100b11eed0846f3eab82

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\82CB34DD3343FE727DF8890D352E0D8F

          Filesize

          232B

          MD5

          a92477bf0284ee5b78c995e013f60541

          SHA1

          b2e3f80243dc36a753d36e8dee8243be31de83a3

          SHA256

          1b0888527fbf105d6a7d454ba80eccab66ea9ea7ed00a604acaf9074774f360b

          SHA512

          89258b8d004e50bb6d37f4790d4c224ab0524695d7b68a1f1874517e8a4eb71f5b4fbf1bb1077c1c22ec29ca2e5bc3ca466fc7902373ac69ad4d4e36ab13eceb