Analysis

  • max time kernel
    86s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-02-2023 14:55

General

  • Target

    https://go.microsoft.com/fwlink/?LinkId=2086738

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 53 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://go.microsoft.com/fwlink/?LinkId=2086738
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3272
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3272 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:4944

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_1DC6D7385EA816C957BA2B715AC5C442

    Filesize

    1KB

    MD5

    235320cb968f512faf9962d76d06b4c5

    SHA1

    b8b33c89f20721d6ddf44daece8f78be9de85409

    SHA256

    8138400bb23c159e707a56fff667ff680abaa9476b1d3c59f5aa789d099f82b6

    SHA512

    af12414a0bb9e7ba2113c0f6fec374538ab45881d3678e9596d460a390933763b874fa8d932126b1b6eda13aca093f86631534dd31e6b4a6045844de59363d47

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    aee722fcdc90fcfba473126bf8bed12b

    SHA1

    df62a695b671a248b19f76cd6d420d1bcee9c27d

    SHA256

    e759250bcfe36a1a745bc1cc241dea84b6c791141e93b322bd5027d62d3a4807

    SHA512

    e51c09b66f06f247289841147cc6ebf2b70308cfac2c500915ed2b4775813e48422e60779e50351ac668bab548afaccb822a1486ae8242bc37697f16f3a994cf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_1DC6D7385EA816C957BA2B715AC5C442

    Filesize

    446B

    MD5

    7080a69c6ec0a3ec63ae976201225bff

    SHA1

    fa9465d3b541ae31b14343c945af34a82abbd74d

    SHA256

    541e4cb64732553720f4f3665266f80795f664c978239edc17842c5aea7515b0

    SHA512

    70b322069f3aca605dff5cb1985d3960b7e80fabd17c6495696457613f459a59f7372ec3a785fc528a36358704c5efc484f1727f831d9d7c50331d2eb4a2e8b4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    404B

    MD5

    c2da51d4ab3d808ea2ef8c3a3a40ba58

    SHA1

    a70122fbe1a26c0cbac82828f62af86c166225e1

    SHA256

    2fd8b58717f381b2aad342f3a93ac57dc65e58851302708b1f9d12aab41a2104

    SHA512

    2693e5fb267b014b23b688a742dcb2f7bffbe39bea9a30004ba0f50d100ad8618208c31d8020592c0f0513101bfe3ade7b1cffa64f3784a2196158e8e9d98ae2

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\zpu22o1\imagestore.dat

    Filesize

    771B

    MD5

    fe4694b870ff7f99d659765503d273e8

    SHA1

    3942905b216e8e3ddf226cd5d0e42b062de1e06a

    SHA256

    570cbfbad17ff58481a7432122ab5141f659620e2e41076964ed79c4ab411066

    SHA512

    5990756ede1c01222a1635e978cfcb17de15f259a73251fe94ee99ff64c5ac8bf2a736066a7f43c5e044248e48f14d3032085fa65c7fee5018c7afd34e46b441