Analysis

  • max time kernel
    143s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/02/2023, 16:59

General

  • Target

    https://9exqt.img.bh.d.sendibt3.com/im/5367385/a2d5caff7e377d05111f103275c69c8f6916cb599236855b93da7cdc776148a0.png?e=8LLHtX-HbEJ0dbBj8bPE1zE3iRa-Sr7RwaNQx0sgVWLRYe-iEaPvFKfgYxEV4lbDjL535iq7z3_eI2RdINDHYGg34wlzOfrkc-AjF09YDi9NlGvLzni68XDYitJCBwS2OITc-rnwlNfgtmeITBoA5BshuSfG6a5v8toofCz-bFb6LPzvIa8gAyXHwKlE_mOdyMZ9YUcUx1bzZmjcM_W8CJxulXpdCIsEBuXkmFdmKjkfL4rdJuHeydxSbDJ4LnR_WziVv9f3NUT8v_J1AGOco94sdgghinzG6fs27pb9wQ2zm-qlAeoyTtqy2Q

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 32 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://9exqt.img.bh.d.sendibt3.com/im/5367385/a2d5caff7e377d05111f103275c69c8f6916cb599236855b93da7cdc776148a0.png?e=8LLHtX-HbEJ0dbBj8bPE1zE3iRa-Sr7RwaNQx0sgVWLRYe-iEaPvFKfgYxEV4lbDjL535iq7z3_eI2RdINDHYGg34wlzOfrkc-AjF09YDi9NlGvLzni68XDYitJCBwS2OITc-rnwlNfgtmeITBoA5BshuSfG6a5v8toofCz-bFb6LPzvIa8gAyXHwKlE_mOdyMZ9YUcUx1bzZmjcM_W8CJxulXpdCIsEBuXkmFdmKjkfL4rdJuHeydxSbDJ4LnR_WziVv9f3NUT8v_J1AGOco94sdgghinzG6fs27pb9wQ2zm-qlAeoyTtqy2Q
    1⤵
    • Modifies Internet Explorer Phishing Filter
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:5108
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5108 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2016

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

          Filesize

          471B

          MD5

          3e41dd9366864e66b96c7435d56506ff

          SHA1

          7514d785e9fad54ffd07bde3f86d90bc4ac52bf8

          SHA256

          5902822e5633fd62796953f564224537bb472a22c1b4d0810f705f8e1e81603f

          SHA512

          ba64698f66e406a64667af24aca8f6187b9c8a477551970d8ba0a73c089b9577bf7c2c1bb95c764f84dc98fdb76d126bbdb1ae96b0657291507af46a2a922d9f

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

          Filesize

          434B

          MD5

          d058a24a6732497ef80ddedfe4769c7f

          SHA1

          c2652e306166ab29f78481b456489836593df245

          SHA256

          8d7496e7ee6ecf12380934e90c8a5235c6512f419824af499e055c293861d6a0

          SHA512

          b5ef348dcfe9f4b806e80b00c527367c1ba9effced864d16f29aa6c07f21312ad9a66b287f5dc778a9653f9555b54cbbe60ac5a2c9644004619e9859dfbb0c77