Analysis

  • max time kernel
    99s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-02-2023 10:58

General

  • Target

    https://security.microsoft.com/userSubmissionsReportMessage

Score
5/10

Malware Config

Signatures

  • Detected potential entity reuse from brand microsoft.
  • Modifies Internet Explorer settings 1 TTPs 41 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://security.microsoft.com/userSubmissionsReportMessage
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4696
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4696 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1408

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\69C6F6EC64E114822DF688DC12CDD86C
    Filesize

    779B

    MD5

    98262107fa93ef390c1eaf69f48fc1bc

    SHA1

    1a994b28a5d6d9f77d2d9089929d3c49614d9710

    SHA256

    c24469c657ba62aa4b35ce6bb6f3d20ed6c27aa09e431430cc89636290214a2d

    SHA512

    b04167dc9640f1b1c4ccf186d3749f556bf05b2c27b5dea1173b2834fa7fc85f71665cd8f114880cde002d542fe0d41cf741fc3fb3d6307b078cffcbc4238ffa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\82CB34DD3343FE727DF8890D352E0D8F
    Filesize

    7KB

    MD5

    ccbadc6446aaf93ac586188bedea1490

    SHA1

    87e805e4a0752896ffa406bde96d8e25e05b2e06

    SHA256

    8d5c958f751c2d17fc3c1a44b9e4ec153db3097b5da3fe4ae1098ed63c4d37af

    SHA512

    b6e598059f925f5c8a84a9d8af3db7ffabc64d75b3926112614ef27426290e32215348a448f021e04e5e1f94f5366818078a97fb34608720e7afcddb57973821

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\69C6F6EC64E114822DF688DC12CDD86C
    Filesize

    246B

    MD5

    ece96596742d1644b33d65ad06e6022b

    SHA1

    55bb2f718b577e93c24000b50b3ef195af37d5c3

    SHA256

    25e90431d67d88b0f2bc7b3e03f2cc0ddbe6bea96603ba201e18dfdc36ca426f

    SHA512

    57e2f9e108b8ca55e42fd8d922abb61e1bd320acc5d15d292b45091005305f7bfd5287ff2bb963ca9b99f36c2344a059229ce479f4b98e05a6c1642a363ae83e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\82CB34DD3343FE727DF8890D352E0D8F
    Filesize

    232B

    MD5

    e421cfb35fef399f316610a5dca6da9b

    SHA1

    9e2e27e352e466ac1fd1cd665a7bcf34470a13d1

    SHA256

    0300370daab157e99548885b47bc70ef96dda1319def7d8aaf3588a0f70f5020

    SHA512

    32d6bed87ed2429ede32772eacb94f157e2adc4f0d57acaf76ba098b7fdb03282603bb4a02d7fe49526856c77e9d731bfa509b80cfb1e2e475c57dfb0558a173

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\dqptnfu\imagestore.dat
    Filesize

    18KB

    MD5

    77fb848757a48b8168e7b08dee651d41

    SHA1

    36f63898947e2bd6a1b0e74246ab2a60aa732140

    SHA256

    ce4aae2970c26aad043cf7a534e57e3a2f33b2bb3e744b08f4f9a4a1d3fb9bd6

    SHA512

    02bc35694b7eb764c58b4384912c116f0b32a5b011beb0b2a98f70d971b07f968b71dc660717977565bf38b8359c00261ae72bbd174c24f185d9d43c54f12772