Analysis

  • max time kernel
    87s
  • max time network
    89s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/03/2023, 05:54

General

  • Target

    https://use.typekit.net/bjq4kjv.css

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 16 IoCs
  • Modifies registry class 1 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://use.typekit.net/bjq4kjv.css
    1⤵
    • Modifies Internet Explorer Phishing Filter
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3924
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3924 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:3372
    • C:\Windows\system32\NOTEPAD.EXE
      "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\0P80TOLA\bjq4kjv.css
      2⤵
      • Opens file in notepad (likely ransom note)
      PID:2804

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\0P80TOLA\bjq4kjv.css.2ms8u4e.partial

          Filesize

          3KB

          MD5

          2f97c7c96b9472a6176758c55624063a

          SHA1

          d6028b8486e623b22e0c8d95bc679237b63e126d

          SHA256

          ae30653e6d0cec2643d0d66e2f509c3f6adfbada7111d74ba0f223f9e222d2b6

          SHA512

          063cfac070176d88d5d27b0c35bfaf2ec4bd19ffb3770d2551b7e7c73476dbb92625e39a22264b07a71a7397539e53882f4f8e1169032c966f75dbb022ebbb2f

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\G1ORIWBN\bjq4kjv[1].css

          Filesize

          3KB

          MD5

          2f97c7c96b9472a6176758c55624063a

          SHA1

          d6028b8486e623b22e0c8d95bc679237b63e126d

          SHA256

          ae30653e6d0cec2643d0d66e2f509c3f6adfbada7111d74ba0f223f9e222d2b6

          SHA512

          063cfac070176d88d5d27b0c35bfaf2ec4bd19ffb3770d2551b7e7c73476dbb92625e39a22264b07a71a7397539e53882f4f8e1169032c966f75dbb022ebbb2f