Analysis

  • max time kernel
    81s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-03-2023 16:03

General

  • Target

    https://storage.googleapis.com/contentgrid-active/hdus/en_US/DTCCOMNEW/fetch/EmailTemplates/images/Icon_Contact_NoCircle_237x246.png

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://storage.googleapis.com/contentgrid-active/hdus/en_US/DTCCOMNEW/fetch/EmailTemplates/images/Icon_Contact_NoCircle_237x246.png
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4716
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4716 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:3848

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    7d614bd89d2957037d60088e7268e639

    SHA1

    ea867050da5309fc99aeb73688f2f525e76907fb

    SHA256

    6e06cc16602c3e13828fe226370a57a0e55c17dcc4c63219ab3bd3bc54a8585d

    SHA512

    8fa2f538d103669735658dc7ec29fe3308086f6e95293c0ce980725469ba80f95092cd6a6fc405b906d4ccfc0113d8139807ccbe5b09169249ea5766c5673362

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    434B

    MD5

    70e2fc38cfa9f7412f6dcac80d1e32c4

    SHA1

    f36ceb742937f42a17fb48ace067ecb60f886ce3

    SHA256

    051aaa4947fa7b361ef3534866c19949a82765e5c47dbc1aa8c5731bfb26ed72

    SHA512

    8297db20434c8e3bb1b3b9ee1e77517fbe32620953db9a4f03842b6946f1a75cf007850817ca5cb5afbd9a94358ef1a31b69308ef8e69d9c2fb7e43a44cf5bb8

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\phzg4yt\imagestore.dat

    Filesize

    980B

    MD5

    e21bfed7d4da6a2f3600603288ded30b

    SHA1

    20577807cd83997f6bcae4a49cd43565c68661b6

    SHA256

    931aa923e84692057b647f8cf5ad4c9aa6dea5e421561fd2fabeba19a833a2cc

    SHA512

    0afdee300208c69490e12e6f8895310d64de832c8d93f73ac5c5d52c365b98b883a54c87f17ff306e5f0fd4c11583612fbf619e685fe0f9d3d9b19bc6809f85c

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\39K1WZBJ\cloud_storage-32[1].png

    Filesize

    850B

    MD5

    352549ece32e8183cb6792d5b1e7450b

    SHA1

    6c6ea952ec11c2026e828f0118bb9a58e35ccfbf

    SHA256

    24283abecab24b0a7f50518ef5e9c684b1abd4fdbb31c6d0e1ca63a236a34d1c

    SHA512

    5cc8c80095b2928eeaeaa987fee7769fc344a913f89d4505f38687d87916351dabea19883550ffe4b95b2e2802fee7297a9927c845f78dd5aa963bff06ae7eed

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\U4IULL1L\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee