Analysis

  • max time kernel
    143s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/01/2023, 07:04

General

  • Target

    https://bafybeibmw6jmuntfskogufd6ue2gy2uyap6ynhumvch7n5upp5navhcs4a.ipfs.dweb.link/?/mail/u/0//mail/u/0//mail/u/0//mail/u/0/v/mail/u/0//mail/u/0/vv/mail/u/0//mail/u/0//mail/u/0//mail/u/0/v/mail/u/0/#[email protected]

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://bafybeibmw6jmuntfskogufd6ue2gy2uyap6ynhumvch7n5upp5navhcs4a.ipfs.dweb.link/?/mail/u/0//mail/u/0//mail/u/0//mail/u/0/v/mail/u/0//mail/u/0/vv/mail/u/0//mail/u/0//mail/u/0//mail/u/0/v/mail/u/0/#[email protected]
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4728
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4728 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:4608

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    7f86d57ec9b88be134e3cfa85ecf7275

    SHA1

    f07afd49f66b446f51930dcb0971d0f2a432fc55

    SHA256

    1d4bab5d07ad03fc4fd60c26afc0906ab99ad01fac40a9e1d324fda5b4809a90

    SHA512

    0d5764c1468c9020ecdc1e68166a71ef9ab6715f8d6c1e31faec3e35ebd16f5b8dffd9b0d54fd84c36cce90fd11a8edbff448c295f561aa0ddadc3110d2ee38c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    434B

    MD5

    738587d3d06af0d005fb22776c887209

    SHA1

    84bae5d7af81a5bb7917d5452024f81e8eedbc11

    SHA256

    75d14f2fa7d726bc8d6cd8cb8deaa51e55beb45fc0b4157e6d3f11252e9fea99

    SHA512

    a90eada1856910884ef48ef3dbc54952a4f861c7f11c1302e3bcbf5783153a23c06a5bc6c959de54d29105f428aea475beb7dca50efe09dc85c80547d511104b