Analysis

  • max time kernel
    148s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/02/2023, 10:58

General

  • Target

    https://neros.rs/WW/mail2000/

Score
10/10

Malware Config

Signatures

  • Detected wetransfer phishing page
  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 38 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://neros.rs/WW/mail2000/
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4860
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4860 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:3904
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x304 0x2fc
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1764

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    627082c64c12e33958757c71e493e289

    SHA1

    76523ca1f952da5ca306f72c6efd497fe90085cf

    SHA256

    4939d97986cdabd824b38fc8ce3d4b8b6ebeafb7a113d2af94944b09e33454c8

    SHA512

    2cb4f47a38d99edfc1c25e520970fb057acdf589da1d097d0a621f020cdb843e8c3fe559d1098b04161f22d0596ccaf34d526b4ead38e5bb94421a5b209daeb6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    404B

    MD5

    315b35b4cf364fe535ec2ec9a0299459

    SHA1

    e868755ee1bdecfa394fd6e44a9121bbb9ac1cf7

    SHA256

    3d6287295f41cc05a7b4b74c294d4a2b0cff3c3367fb7385ceffe35deffbfc36

    SHA512

    4020c523e8d4014e5bbb646cd64e90fba7486068320b43d47b4cfc8ce7f315936eb05b02a47dd66a994645e1d404c5e6acad45c938fd73ca93a459364e2a0760

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\dqptnfu\imagestore.dat

    Filesize

    41KB

    MD5

    799e99274de9fff6936d019d443de966

    SHA1

    7ed446a8c74e5f97e433e0797c13350624fbb233

    SHA256

    9c931505e37c6c3e59081e390a49ee9a86ceb8f0fe13ec277df5ff60b8f851c5

    SHA512

    9d67f1a085ec18b650c11c2e1b03455d1bec59ae53a5478602551c3e504ae025c66ecc89fe186bdcae264f538706da180cdd78d1dc80551cee6cbc55758a572c