Analysis

  • max time kernel
    142s
  • max time network
    137s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-03-2023 13:49

General

  • Target

    https://www.google.com/url?sa=t&source=web&rct=j&url=https://www.azure.cn/en-us/pricing/details/virtual-machines/&ved=2ahUKEwjb8ICn8b_9AhVnRTABHbQrCO4QFnoECCMQAQ&usg=AOvVaw3OokdgbroyRXQYQq8Dmk7D

Score
5/10

Malware Config

Signatures

  • Detected potential entity reuse from brand microsoft.
  • Modifies Internet Explorer settings 1 TTPs 43 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://www.google.com/url?sa=t&source=web&rct=j&url=https://www.azure.cn/en-us/pricing/details/virtual-machines/&ved=2ahUKEwjb8ICn8b_9AhVnRTABHbQrCO4QFnoECCMQAQ&usg=AOvVaw3OokdgbroyRXQYQq8Dmk7D
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3272
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3272 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:4844

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_1DC6D7385EA816C957BA2B715AC5C442

    Filesize

    1KB

    MD5

    11c286222378e8890f8b2d7b6165137c

    SHA1

    6161d356fda5d582465db13afd21119b31616e37

    SHA256

    d7284ac02e1a006336d7ea30921d56a4549044f5086a94325b56a49ccfb20609

    SHA512

    9ab1328d70c369f112f2bfc427d161eac4c0815031abb3ca1a31ff009193607e6ee86e6ab9d12988e07cae8a283fb77c418b81a402a53d92caa9a470f7bc3722

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    7d614bd89d2957037d60088e7268e639

    SHA1

    ea867050da5309fc99aeb73688f2f525e76907fb

    SHA256

    6e06cc16602c3e13828fe226370a57a0e55c17dcc4c63219ab3bd3bc54a8585d

    SHA512

    8fa2f538d103669735658dc7ec29fe3308086f6e95293c0ce980725469ba80f95092cd6a6fc405b906d4ccfc0113d8139807ccbe5b09169249ea5766c5673362

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_1DC6D7385EA816C957BA2B715AC5C442

    Filesize

    416B

    MD5

    26563652ba9756e773c59f19c72d276f

    SHA1

    96ab06f10a8b1ca69452328189707e4caac705c9

    SHA256

    33fbad0d74e7fdd29011f09c808951111393af4dab0543f2ffcda09e2f0476d2

    SHA512

    5d4780333a600fc24254b249bca3ce14d8d81beea1299c904753e574031ac5d676857df92fc6d70a4a9a95c16ff994780ea095ec2984be64db8a344a83b83708

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    434B

    MD5

    2b92b4d1845a49addfb11ff59f2616b8

    SHA1

    0fbd156814b0925509c62f17cb73448b96930a55

    SHA256

    4814ca10b8b94196ec2ac5dd23ee1a30fe31e028a00f083a5958096c54f1074f

    SHA512

    1e5deab1e1c170a571a1123d61e9b02757be75e7f2202ede9234cae544e6bb9d80ba62f1e2f5402f78ed03718eebbec5dd2efcb461db580027940811be9fa882

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\phzg4yt\imagestore.dat

    Filesize

    17KB

    MD5

    8a2f87b5e4e6f27e993d8fc8baca2fb5

    SHA1

    1d3d4ec88972841862f45c8cf83e0bd864196f4c

    SHA256

    339fefb7ac710dcfee666fc3ac746ff62a6474421c951895ac9d66f1ab349506

    SHA512

    4dcbc518af4ab8a6b5183fc367e24453222024c1c408bd3464934177cf2c0f8a696336c2e224346ae6ab0f3d7ed36c10290daf226b8e4b395fb817b80c86b6fe

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\phzg4yt\imagestore.dat

    Filesize

    17KB

    MD5

    8a2f87b5e4e6f27e993d8fc8baca2fb5

    SHA1

    1d3d4ec88972841862f45c8cf83e0bd864196f4c

    SHA256

    339fefb7ac710dcfee666fc3ac746ff62a6474421c951895ac9d66f1ab349506

    SHA512

    4dcbc518af4ab8a6b5183fc367e24453222024c1c408bd3464934177cf2c0f8a696336c2e224346ae6ab0f3d7ed36c10290daf226b8e4b395fb817b80c86b6fe

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\39K1WZBJ\soft-category[3].json

    Filesize

    291KB

    MD5

    c8051ee813d52a04f410b0f054633a41

    SHA1

    0936badf6c0cf0ab6c4e91dc1f17801ab06cf41e

    SHA256

    7cc21d0b8a7007bd4c4ea9842087f59a5565a40456bb0ccbbcb95ca57de3a3e9

    SHA512

    56684b292709f7784a900e766735bb8e43fb9ceee2f1332ccbd1275c554f45f114d2a5b69360b425b182d4a372a9c2fba1db0e4cd32e44f3d72e6e2e03f10ae0

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\EY3KXMB3\favicon[1].ico

    Filesize

    16KB

    MD5

    12e3dac858061d088023b2bd48e2fa96

    SHA1

    e08ce1a144eceae0c3c2ea7a9d6fbc5658f24ce5

    SHA256

    90cdaf487716184e4034000935c605d1633926d348116d198f355a98b8c6cd21

    SHA512

    c5030c55a855e7a9e20e22f4c70bf1e0f3c558a9b7d501cfab6992ac2656ae5e41b050ccac541efa55f9603e0d349b247eb4912ee169d44044271789c719cd01

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\U4IULL1L\jquery-1.12.3.min[1].js

    Filesize

    94KB

    MD5

    c07f2267a050732b752cc3e7a06850ac

    SHA1

    220dad6750fba4898e10b8d9b78ca46f4f774544

    SHA256

    69a3831c082fc105b56c53865cc797fa90b83d920fb2f9f6875b00ad83a18174

    SHA512

    9b1d0bf71b3e4798c543a3a805b4bda0e7dd3f2ca6417b2b4808c9f2b9dcb82c40f453cfae5ac2c6bafc5f0a3e376e3a8ce807b483c1474785eb5390b8f4a80e

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\U4IULL1L\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • memory/4844-276-0x000000000BAF0000-0x000000000BBF0000-memory.dmp

    Filesize

    1024KB