Analysis

  • max time kernel
    144s
  • max time network
    140s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/03/2023, 07:28

General

  • Target

    http://paloaltonetworkspartners.us.newsweaver.com/miscellaneous/htjvll9hsvc1lptck1wq7j/external?email=true&a=6&p=12291157&t=80103

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 54 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http://paloaltonetworkspartners.us.newsweaver.com/miscellaneous/htjvll9hsvc1lptck1wq7j/external?email=true&a=6&p=12291157&t=80103
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1968
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1968 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:4156

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DOMStore\LWFA0CQ8\www.paloaltonetworks[1].xml

    Filesize

    13B

    MD5

    c1ddea3ef6bbef3e7060a1a9ad89e4c5

    SHA1

    35e3224fcbd3e1af306f2b6a2c6bbea9b0867966

    SHA256

    b71e4d17274636b97179ba2d97c742735b6510eb54f22893d3a2daff2ceb28db

    SHA512

    6be8cec7c862afae5b37aa32dc5bb45912881a3276606da41bf808a4ef92c318b355e616bf45a257b995520d72b7c08752c0be445dceade5cf79f73480910fed

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\q7s3h6i\imagestore.dat

    Filesize

    1KB

    MD5

    aac31b81b6d5a51342e435d0cb45ea92

    SHA1

    a5fad0718dfb054649558ff73c799c4012caa2d2

    SHA256

    21303f632a8552eb5386f2ce170840e8d1028df48fd9bea38ca0eac29bc0ffec

    SHA512

    23345e1ea18a8016c84ca7aca9cb49d5ee3fcd9dc93b9c71ea046bbb9bb314d5dff36ee2cb3b61ec69c6578ae5b6717c947d67d2291c528bab03f0728d59bab8

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\V6GB5GU8\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\Y624AVVJ\favicon-32x32[1].png

    Filesize

    894B

    MD5

    fd55076a3a6737b12a014ad865b3313b

    SHA1

    f388c644d5f673c7cee601d4bec6e336058dfb6f

    SHA256

    bd016b61c7da539a97e0bded18e5f5e8fc3b8d776417d71392af928761dcb3a4

    SHA512

    51ae1e789245ba8fe1081b86b0ff7983a90013dd00681c549d3f70dcdc1e680ba59a89595c83125ea1ebad322854918cae2bfca36dc0d91f6480f168eed4630a