Analysis

  • max time kernel
    102s
  • max time network
    132s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/03/2023, 21:12

General

  • Target

    https://clicks.ine.com/f/a/kNyOxwmevzF0NWhDgB3H5Q~~/AAQRxQA~/RgRl81yiP0QlaHR0cHM6Ly93d3cuZmFjZWJvb2suY29tL2luZXRyYWluaW5nL1cDc3BjQgpkCqLXEGQtrtpvUhFpc3JhQHNlY3VyYWRvLm5ldFgEAAAA0A~~

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://clicks.ine.com/f/a/kNyOxwmevzF0NWhDgB3H5Q~~/AAQRxQA~/RgRl81yiP0QlaHR0cHM6Ly93d3cuZmFjZWJvb2suY29tL2luZXRyYWluaW5nL1cDc3BjQgpkCqLXEGQtrtpvUhFpc3JhQHNlY3VyYWRvLm5ldFgEAAAA0A~~
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1508
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1508 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:3440

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DOMStore\JP3CBJC6\m.facebook[1].xml

          Filesize

          332B

          MD5

          d7135e4b791def7633590c8743a40b57

          SHA1

          38702e0b3b5fb82f9cd349dad5a9a5f7a9991d2d

          SHA256

          1a84f94271a03cd51130a609a383b0dbcc34758140ea838ca0b51d5d1ca39f33

          SHA512

          13329fd2db8a356bb74d98c7903aacea1bbc6d91074b6b9bf79191d500d7289e682658ed87dfbc4981caf6547404b00dae42ae55d8aba4e3c16698f4a8d7c09d

        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DOMStore\JP3CBJC6\m.facebook[1].xml

          Filesize

          332B

          MD5

          dd7bb42741e9e201282addc25d17527c

          SHA1

          6c3ffe69ee4eed8c9d5edfbded43510fcb7ebb72

          SHA256

          5bfa6d28be003db2ffd10936c7856b5652310dc96597ea626df33ccedecf3cec

          SHA512

          abfeaf7736c355c5bd362ac5d3a92e6533cf27d81714f80e9fc8089475fbcd8ac90e9dcbd5272610d9a6617df53f96f70a42a3411e345f50defa20cf91e48e20

        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DOMStore\JP3CBJC6\m.facebook[1].xml

          Filesize

          580B

          MD5

          a4c7f1e2af4e52133a86e00ab6cbb1b4

          SHA1

          9d99df70aa944db82929659e925ab34b249ecd03

          SHA256

          927ff2053ed17cd6904e21cfe9f1de0bd30be8ad2c7559b19425f977429aec8d

          SHA512

          594b5f89555a317562fc51a62c2df674f85296d514d47822e995150e942b49be6b8de726f8311e8912002970e1ca919f96f9290c38f6b3b19c9a9277471a1779

        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DOMStore\JP3CBJC6\m.facebook[1].xml

          Filesize

          711B

          MD5

          782e8bc554b2d35cd436ff482e97db79

          SHA1

          764bada0323beeb15e83e7ab6e2b9097a2eac023

          SHA256

          e561f1e5d332d220ea710ccd26753aec84b29db117690cf37263fb40f39784f3

          SHA512

          f4791cfa2e4d707a63469f19b69d2864d163c0f517a8bfe413e7a537be632d2c5d808adb09a3e8773f9af26d37f562c8fb8a8e8c1309fe872485c9f7a203f286

        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\phzg4yt\imagestore.dat

          Filesize

          6KB

          MD5

          efbba2e10ac06b8661be72f147a10b86

          SHA1

          86dd88562ef0574dbd820e37bb41fcdff78ead48

          SHA256

          6741b7f8c729e79cd5e486b57266f0f710e23abd7da7743e4537cdad5f6608c3

          SHA512

          4bc62f9f4f2a74c1609ac603daaf827f58c9cd7fc831d0e407cd8ee09344420dcacd282ecba68d5c83da7fde6cf3dc22bf261d53a19fec58f3f1d8fe377df29f

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\39K1WZBJ\suggestions[1].en-US

          Filesize

          17KB

          MD5

          5a34cb996293fde2cb7a4ac89587393a

          SHA1

          3c96c993500690d1a77873cd62bc639b3a10653f

          SHA256

          c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

          SHA512

          e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\EY3KXMB3\gB76kJXPYJV[1].png

          Filesize

          6KB

          MD5

          389dfa18be34d8cf767e06fd5cde4ec6

          SHA1

          47b751cffab47d076816c63ce08d3e84600376ee

          SHA256

          3c45ce612f41b1e7936e7cf5b235047344fd3146d1630e342f186d1d1e8e00d5

          SHA512

          c4db18f636ad85e87f93a208fb4b02b528659ba367e51cfa6d7826ac1159f445a85fbca8d12ac67556e8fb5208dae24ae309e783d50feb088ef0e9f47ac19430