Analysis

  • max time kernel
    73s
  • max time network
    130s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/01/2023, 19:44

General

  • Target

    https://itb.planhub.com/ls/click?upn=-2Bz-2BqGQ-2Bmlk3z2lOf-2FfomoB3PRKaq0HVgZAtzMVoyck71E2DOTphqEPUlVSySxY1VB0TkkDfcxCHoUnFiikfMk6edU3i8T5kZwNxFRoHsxLRRFO6WuuqFpz9LxqEk-2BMTZHVtBF5Q-2Fv6gvhQQL0-2BVYg441cgfI-2BrHx06Nj-2FygpjGCfLblHZ6sAHMAJcWP8dJ4TN2wmIaDQgDWTS08Dafr10K88AFsNpjgiCR-2Fh9F5q2Gk-2Frb841aseCeiVi-2BZRHeKXEH9f_FMdrpyx2GwWIuNQccqlJe5QWe8lBpoEaUEI3mOI554f5sEcob9hOGzZQxqodi-2BYbakEkynCyuF-2Bt-2BUwg7fdkdT-2FXQegZ77SkcuIWuRREikBag0ai0Wo6w4ZE13fwRZuGFJSmlq1OhMlyQgzV6Y2r565RaWAoUE7cG2P4ccYXiFdUhAgdg-2Bnnu8Fj1-2FBwJIUzHniEkJppDIQmD2Ee9YagONprfUw1fY4kcl3uLzx5aIdAaap-2FinoYC3N25gWZhZPCPJ4IMC2lGfUH-2FxFWYEk8MBd3bsJ3WSdLzoanDeleC0Jood-2FHXH-2BBSX7dJMM5fvyo-2FJcdqo0bRmY0cx0AQrFFcmc5jtOiPW0Yro1miRaLspHPIRBhaUCrcFqpGRsaqW5q4NhospGRbRMpUW5edLoeoNyjpYslb-2BBeBtbmZF1GqoE-3D

Score
6/10

Malware Config

Signatures

  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://itb.planhub.com/ls/click?upn=-2Bz-2BqGQ-2Bmlk3z2lOf-2FfomoB3PRKaq0HVgZAtzMVoyck71E2DOTphqEPUlVSySxY1VB0TkkDfcxCHoUnFiikfMk6edU3i8T5kZwNxFRoHsxLRRFO6WuuqFpz9LxqEk-2BMTZHVtBF5Q-2Fv6gvhQQL0-2BVYg441cgfI-2BrHx06Nj-2FygpjGCfLblHZ6sAHMAJcWP8dJ4TN2wmIaDQgDWTS08Dafr10K88AFsNpjgiCR-2Fh9F5q2Gk-2Frb841aseCeiVi-2BZRHeKXEH9f_FMdrpyx2GwWIuNQccqlJe5QWe8lBpoEaUEI3mOI554f5sEcob9hOGzZQxqodi-2BYbakEkynCyuF-2Bt-2BUwg7fdkdT-2FXQegZ77SkcuIWuRREikBag0ai0Wo6w4ZE13fwRZuGFJSmlq1OhMlyQgzV6Y2r565RaWAoUE7cG2P4ccYXiFdUhAgdg-2Bnnu8Fj1-2FBwJIUzHniEkJppDIQmD2Ee9YagONprfUw1fY4kcl3uLzx5aIdAaap-2FinoYC3N25gWZhZPCPJ4IMC2lGfUH-2FxFWYEk8MBd3bsJ3WSdLzoanDeleC0Jood-2FHXH-2BBSX7dJMM5fvyo-2FJcdqo0bRmY0cx0AQrFFcmc5jtOiPW0Yro1miRaLspHPIRBhaUCrcFqpGRsaqW5q4NhospGRbRMpUW5edLoeoNyjpYslb-2BBeBtbmZF1GqoE-3D
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1012
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1012 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:4568

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    d0fa3e14aa98e722c09df687a47d7e47

    SHA1

    862090d91c3e7a7febb6802565711bdb162a1996

    SHA256

    0a77019c86c91365155246e0dfd1b87604b9b59dd473fd8e3196c79b92e46005

    SHA512

    9ec6f58d71dfd92028caba9cbda737ef9b9df4a300cef25d23c1ed3280f2ca0679bfc97a9da46aa0e6b87f0462266b721329cbb31c93989665667b013225f476

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    434B

    MD5

    be3d15f371a4c27e86e62114ea095379

    SHA1

    300d7b2fec97a1a09c10f88c6d496f2126f978a4

    SHA256

    81a5b9487778c952b7b756f2cb09ea556d73e3a07f9585e7408b9c5764f39708

    SHA512

    413bc650d25e15f0142c937cb9c5021a54f4929f868ac7fa68eaa0efd37ec2865b243f34dfbd8de5e75cf9396762907344f6c588c1529abbb444976c1714d79b

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\dqptnfu\imagestore.dat

    Filesize

    2KB

    MD5

    e683d7c4657d0e986e059337ba200458

    SHA1

    8d95609a7838df97331c478b6553a7d3ae5d027b

    SHA256

    20aa3ec6a24ee27eb65aa43e59d451fcd54371b4c66306f040a94511ff14233d

    SHA512

    6333a889c6d624e6f0c411b4d57ad976f36416d35478e8e1789042fdd2849f67258eb86e6777c71a6b19525cccb06710391e33df718bad72d50c78ee8e4e8f88

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\dqptnfu\imagestore.dat

    Filesize

    4KB

    MD5

    6db7852d83e7a741db6bdd99ca8e2daa

    SHA1

    1139b8bd613c9d140dea76f3006791095399f9ce

    SHA256

    0dc5625f74bb8e3cb15a77ecec12c3f6c65bbf9e0c7bd96c166edcc24148b7d9

    SHA512

    c9d1430871872d32d32968a02e7a6c19a0ddb4918dfe61d06cc587d412e8d2e4901e8fb0a56302c7f0c773028cd50425d4cbdeedd3d2a9ef2657b7299d4a262b