Analysis

  • max time kernel
    73s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/02/2023, 16:59

General

  • Target

    https://fdghdif.r.bh.d.sendibt3.com/tr/cl/BVq4o588XfZILnBvJFk7khBCUiMwsvsHI8WBIRj2IRvf75Mjy6MVkyGG_aZkWybeqWzFv0bClFoex_DZ_nTqf6HBgYp1pnJ6XvIGFspS_k46t1a0wEjh_EU1fVFvv799IE_FLUGbRNcCUXNxv181ataDCBf-HwABEMcg43-QZnNWQkB8AIyLGsFCT1R6rYTq0nlF3sJ9KzjR1YuP3XKf4bmOQ2pdn6DQZvlSDX0jp_ASrkBnLqLjnlxESqzwSUmnrdk

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 41 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://fdghdif.r.bh.d.sendibt3.com/tr/cl/BVq4o588XfZILnBvJFk7khBCUiMwsvsHI8WBIRj2IRvf75Mjy6MVkyGG_aZkWybeqWzFv0bClFoex_DZ_nTqf6HBgYp1pnJ6XvIGFspS_k46t1a0wEjh_EU1fVFvv799IE_FLUGbRNcCUXNxv181ataDCBf-HwABEMcg43-QZnNWQkB8AIyLGsFCT1R6rYTq0nlF3sJ9KzjR1YuP3XKf4bmOQ2pdn6DQZvlSDX0jp_ASrkBnLqLjnlxESqzwSUmnrdk
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1712
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1712 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:3556

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

          Filesize

          471B

          MD5

          3e41dd9366864e66b96c7435d56506ff

          SHA1

          7514d785e9fad54ffd07bde3f86d90bc4ac52bf8

          SHA256

          5902822e5633fd62796953f564224537bb472a22c1b4d0810f705f8e1e81603f

          SHA512

          ba64698f66e406a64667af24aca8f6187b9c8a477551970d8ba0a73c089b9577bf7c2c1bb95c764f84dc98fdb76d126bbdb1ae96b0657291507af46a2a922d9f

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

          Filesize

          434B

          MD5

          761c7a09cec9c3a7dcd7ad33b32caa7f

          SHA1

          03ba738d2cf3f0462017d9a5eb8bd6b95a36c839

          SHA256

          ec01738ecd5e31a740c833ac7da36b8b72075b40e237694c4e5c4f321bdc5dc4

          SHA512

          d809fc584f2ba00f0af95c4f0391c77e566eea0d7c58e11320e01cad675bb0f35e520a23f42f30b39afa705b26867e13a6c685a2cd52ef33525edaee9dbfc4e9

        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\xyoggsx\imagestore.dat

          Filesize

          5KB

          MD5

          81cbfdcf1aba2304d371ed562c5d5f97

          SHA1

          e1ee6eb0b3a8d40dc420c0d6b6a6b36e13fa1299

          SHA256

          2768ba8a44824e7d61ad7940d2b9f87e283abdc03f57c158cf13113b9d1eb64b

          SHA512

          09da567d922f7e85704b8ee67e3f3f9c9aa41613baa92a5958711aaa499fe4f2286a6f3d523e9652cead66f75f4838beaeefcbb803d2877c04f3617beb87c3f8