Analysis

  • max time kernel
    134s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/03/2023, 13:15

General

  • Target

    http://newsletter2.ispringsolutions.com/ls/click?upn=N6lyplR64n7FlauApOy3eoeSLdSDrC3mHfQctmT5WZUQNJsy76hjsF46xFuAgpkF12Lwk97vU8GPVpU9EUWmDGgLVMNoaDCJT2j3SxpCT3-2FR8R-2BHYh16xyijqn4Irrf-2BsHrFYkx-2Ft8-2Fg6-2FyUb9NeldmiT-2FRvf82h7-2Bnwulslwg1tRPvBvLrCV9yJ-2FZkHwbSsja-2BTJHvt0PIZ95-2BIww4TMcTuWVOR0p85r-2BATT3lggR00smcLWyV4AMHLATYgDmJiWO266FQFbKnHNZYUWC4G7vxzP2v6Z8Id8oW0CiyGZ0DAXxhWrBjlavY5PHbeYVnCCJ2OfyvjqElDK-2BZOuw5Uuu-2FgbqHqwV-2F54VVgzoE49fQ-3DuJoW_DBZixd8N-2FpyymHSQWWRCL0lF4pVnLsyFbe6Xo8eKGItLezWPSc0q-2F5X47IEm05bnpZfquKLoqqzsvyFUPzu8vxZl7wl-2BJDPwPKyFDP-2FSKQxSqpSfy595tu-2BVgIFSI2cj7Bh3Z4t1TXXg232iEcMvcW8oo0LFkc-2Fn5hEdF-2B9uKUYdQ-2BfVMfM4dKVPgmlt9o7-2Bh3UkKs1rZnphSirvuySepb-2B9Ogx3zSyvCID9EZX70iulXJsXBVvTI72uiVxW3AOcSEFeKpuDxrbbZE6-2FpE3agg9pDs2hyk-2BdAxy8h-2FWr-2Bh9B1-2F6H9UtjZYKzlkiDz1o63H5Fejmi9a0x584fWdYYSg-3D-3D

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 54 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http://newsletter2.ispringsolutions.com/ls/click?upn=N6lyplR64n7FlauApOy3eoeSLdSDrC3mHfQctmT5WZUQNJsy76hjsF46xFuAgpkF12Lwk97vU8GPVpU9EUWmDGgLVMNoaDCJT2j3SxpCT3-2FR8R-2BHYh16xyijqn4Irrf-2BsHrFYkx-2Ft8-2Fg6-2FyUb9NeldmiT-2FRvf82h7-2Bnwulslwg1tRPvBvLrCV9yJ-2FZkHwbSsja-2BTJHvt0PIZ95-2BIww4TMcTuWVOR0p85r-2BATT3lggR00smcLWyV4AMHLATYgDmJiWO266FQFbKnHNZYUWC4G7vxzP2v6Z8Id8oW0CiyGZ0DAXxhWrBjlavY5PHbeYVnCCJ2OfyvjqElDK-2BZOuw5Uuu-2FgbqHqwV-2F54VVgzoE49fQ-3DuJoW_DBZixd8N-2FpyymHSQWWRCL0lF4pVnLsyFbe6Xo8eKGItLezWPSc0q-2F5X47IEm05bnpZfquKLoqqzsvyFUPzu8vxZl7wl-2BJDPwPKyFDP-2FSKQxSqpSfy595tu-2BVgIFSI2cj7Bh3Z4t1TXXg232iEcMvcW8oo0LFkc-2Fn5hEdF-2B9uKUYdQ-2BfVMfM4dKVPgmlt9o7-2Bh3UkKs1rZnphSirvuySepb-2B9Ogx3zSyvCID9EZX70iulXJsXBVvTI72uiVxW3AOcSEFeKpuDxrbbZE6-2FpE3agg9pDs2hyk-2BdAxy8h-2FWr-2Bh9B1-2F6H9UtjZYKzlkiDz1o63H5Fejmi9a0x584fWdYYSg-3D-3D
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4472
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4472 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1488

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\cz9baam\imagestore.dat

          Filesize

          831B

          MD5

          638fe6e5428023e32083ec0d3e12a18e

          SHA1

          d6972581d3ec21d18ca18c4cc602fd5bcd6a130b

          SHA256

          36ac2ff3b064afc8bd74c660efeba960072433fd1e4b81b2e4cfd825756bf98a

          SHA512

          54a3cb282a0fa5d99a4f6dd74036508b388d0ce46464122fdbce84ddd0bf9c9a77ff9d67fbc5e9b9cb1cee5ce625b4f245e22b18316c9bd5276a923e8278b589

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\GPVLIKPI\EuclidCircularB-Regular[1].woff

          Filesize

          49KB

          MD5

          fc429e0737672c394ca13ffe8868649c

          SHA1

          ecc6c282989b93806fe3364eda70ee0a3e03fa6e

          SHA256

          473dfc5345bbf0bc87f38deca76461cc4d3eb92a6758830efc52bb156d7d6e4e

          SHA512

          717f10a3c245f55325c1666b6395630747606e162ed0294f5317dcde162b43f804011cf7483fe7e47d9286242ea995df0c90142749e6c6fb68de15b329d1c395

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\RPW4GWWI\EuclidCircularB-Medium[1].woff

          Filesize

          49KB

          MD5

          ead022623d66180ef1463b0f38b41dff

          SHA1

          d56d18c6ab0261de748e7e89fddd706dbf637bb3

          SHA256

          a59534aa843d8e673824bc76df06b7774082fd72c06d2ffc9d6901dd82ace9a0

          SHA512

          041811d0637bdb82c17263c30a8e2c6f89ca21729ec3f1ea0e705d7d1b2d9c8d14b52d0d39e50a2533f45f4e73cf3c938b41483661f33d1c7de83e319bd0b911

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\RPW4GWWI\favicon-16x16[1].png

          Filesize

          595B

          MD5

          4d12ff107ce8bd2657c751a1a00670af

          SHA1

          8e4683255ac6cde45651f5949fc31f1268f28ddd

          SHA256

          a9021fc0e37b5ec71423a761313690d9b9be22bf77b514ef7e30cac5d217fe7a

          SHA512

          02e7080208511f65c6ee7ceaa9bbf1d5e89a1f0989ac6f9e4217b72dc21a51e8a2984bc095c8ec4ccd353e158a689efbacbaf42f9522db5a1407d59a8fad52c1

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\RPW4GWWI\suggestions[1].en-US

          Filesize

          17KB

          MD5

          5a34cb996293fde2cb7a4ac89587393a

          SHA1

          3c96c993500690d1a77873cd62bc639b3a10653f

          SHA256

          c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

          SHA512

          e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee