Resubmissions

31-01-2023 01:42

230131-b4t28aec29 8

31-01-2023 01:31

230131-bxq2zseb26 1

Analysis

  • max time kernel
    134s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    31-01-2023 01:31

General

  • Target

    http://secure.simplepractice.com/mixpanel_events?device_type=ios&email_type=client_portal_invite&name=client%3A+client+app+download+link+accessed&redirect_url=http://am0bsy.yenideninsana.com/[email protected]

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http://secure.simplepractice.com/mixpanel_events?device_type=ios&email_type=client_portal_invite&name=client%3A+client+app+download+link+accessed&redirect_url=http://am0bsy.yenideninsana.com/[email protected]
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:856
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:856 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:580

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    61KB

    MD5

    fc4666cbca561e864e7fdf883a9e6661

    SHA1

    2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

    SHA256

    10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

    SHA512

    c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f7561d3eeba0dfe7d4a796badda5807f

    SHA1

    5fb7943e244ae1a4e9cbcf4497d1e5a2e9c3d058

    SHA256

    94970b5a023e206a643b0d96b28c669bab3700005b282a3f99ac72d498090a8b

    SHA512

    2229aa1dd31006e36639689a68cddc0a3b9ad793ddbcdc5af9ac88d244f002f3729077822424cbe073626a83e649a39d764f6e0a42dfc1e6cacb2d64622c9dc3

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\mlf2v8h\imagestore.dat

    Filesize

    3KB

    MD5

    99c39faf5fd07570b980412370e8daf2

    SHA1

    4b4d300ae32bdb4494baeeefdc6849e6cdb88b17

    SHA256

    f56b891162a4f367ba12558179c0bf0f722e5cf8e431ef99032deadc157d8559

    SHA512

    466f85e25a9a85254d36866ec8b9873384143eb9bfb47b82e132e310527788d5ad59a104e14bbd3431c6206fdca3237856f42820ac213e6151b88051e0fbfa95

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\AA1X4JI7.txt

    Filesize

    604B

    MD5

    424c17105bb2bb58b500dbaaa61ae091

    SHA1

    b73ec472c02aa5ae477d32a0c9c2f0e3ca8a5d9c

    SHA256

    f91527bf2993a562645797a7de4508a6c518dc398efc3ab6935303f98803530d

    SHA512

    1f1769dc13a01c204a4e409fd57ee42e67ba118d2db23bdaf62424f6a1e2cf7f1ab2759f0c8514e5834a3dc061a266a37291d92e45705fdc2bff0d303fd17d71