Analysis

  • max time kernel
    104s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    01-02-2023 10:58

General

  • Target

    https://deref-mail.com/mail/client/mbjcFpumkc4/dereferrer/?redirectUrl=https://wetransfer.zendesk.com/hc/en-us/articles/204909429?utm_campaign=TRN_TDL_05&utm_source=sendgrid&utm_medium=email&trk=TRN_TDL_05

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://deref-mail.com/mail/client/mbjcFpumkc4/dereferrer/?redirectUrl=https://wetransfer.zendesk.com/hc/en-us/articles/204909429?utm_campaign=TRN_TDL_05&utm_source=sendgrid&utm_medium=email&trk=TRN_TDL_05
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1360
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1360 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1948

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    340B

    MD5

    1812b59b5f3452dbbcb68ba8d78eeef9

    SHA1

    9dac609154d0f4566b920b2a9ba3cd3034ca6974

    SHA256

    ba94b956318c7382eeb1919adcf058f89b7617937605c6701db89c04ccd6cdd2

    SHA512

    6022351ab2324e509ea107e616268f92945642e07ba8aab94020643c331757108b6c94c6f65e200697cabc1ee46a5b41e386a11082398301fd71136215d60a2f

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\KV7OXP8S.txt

    Filesize

    606B

    MD5

    a665201ef427960ddfd11702828de5cf

    SHA1

    efc658cc8dd17868592e0bd0f802c6633bf2532e

    SHA256

    84f2b8911e06a39a73f1054e62e7bb1f3ccaa99478fd386838da0bd9c76fa2a8

    SHA512

    ab8091eed5e9e8d8612420f991b8d2011923feb6e7411f53f9467165c5a9c4cef72d0ef14aa6ea81a8fa7acd53a45224122e4c977b9f577e732c2d04471010cf