Analysis

  • max time kernel
    73s
  • max time network
    142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/01/2023, 11:59

General

  • Target

    https://na3.docusign.net/Signing/EmailStart.aspx?a=b1578af4-ae28-4259-a053-95cbaf157079&acct=23479bb3-999f-4f40-b758-67011b512345&er=04af9834-5f81-452d-99e2-b641a511deb5

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 43 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://na3.docusign.net/Signing/EmailStart.aspx?a=b1578af4-ae28-4259-a053-95cbaf157079&acct=23479bb3-999f-4f40-b758-67011b512345&er=04af9834-5f81-452d-99e2-b641a511deb5
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2876
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2876 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:4312

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

          Filesize

          471B

          MD5

          7f86d57ec9b88be134e3cfa85ecf7275

          SHA1

          f07afd49f66b446f51930dcb0971d0f2a432fc55

          SHA256

          1d4bab5d07ad03fc4fd60c26afc0906ab99ad01fac40a9e1d324fda5b4809a90

          SHA512

          0d5764c1468c9020ecdc1e68166a71ef9ab6715f8d6c1e31faec3e35ebd16f5b8dffd9b0d54fd84c36cce90fd11a8edbff448c295f561aa0ddadc3110d2ee38c

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

          Filesize

          434B

          MD5

          1125a4024ccf7da3a01de8028e7b1622

          SHA1

          e77b5cddc4c373678133c10d8f01ec8bd559a4f0

          SHA256

          78553f1b3ccfa952a12b6a99ded19cbd3e6d264a420a5b6d121ba508d2ce5de6

          SHA512

          66910f70eaeae422822afa7d8743beb37e2785b7bbc38d8512b7181f138f8c14e9681f7d32b854b01d10cd2354d865f23c0faaa489ec178f568c05969b32e0be

        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\zpu22o1\imagestore.dat

          Filesize

          792B

          MD5

          60b6f512503bf762d46fd37d41ca707b

          SHA1

          49563911dd5395053d99162121ab6b76a0f5944f

          SHA256

          dac4e7128d8bf379d145d3f53c3e6690eab57a826a72582151bf044264ceef00

          SHA512

          3a340a63c69525c774965b8366d2f5ba69d4ea4df5ac0a9c404cf849b5ec8e8d957e1fe724cab19be40c3fa55fe61b7a4cf41ed2a936303665be9940a1df3349