Analysis

  • max time kernel
    115s
  • max time network
    137s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-03-2023 16:28

General

  • Target

    https://protect-us.mimecast.com/s/mkMICJ6r48fDOQWhGBAE7?domain=canva.com

Score
3/10

Malware Config

Signatures

  • Program crash 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://protect-us.mimecast.com/s/mkMICJ6r48fDOQWhGBAE7?domain=canva.com
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2088
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2088 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:4496
  • C:\Windows\system32\WerFault.exe
    C:\Windows\system32\WerFault.exe -pss -s 476 -p 1488 -ip 1488
    1⤵
      PID:2476
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -u -p 1488 -s 1764
      1⤵
      • Program crash
      PID:4216

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\dcpq11e\imagestore.dat

      Filesize

      1KB

      MD5

      bccb2e8a672b88c58d7c1240bbdcca5c

      SHA1

      16ae6fe98982e9b9941ef051f50de9a989a95ae6

      SHA256

      965ee095bb518896d99bd3d31f8a49930d97ac339e1912060c3b943ff1814e39

      SHA512

      129eadb41b8eb9326018069e0238cf2c64c2efbb37b60e6be5461e6ae3906a589de0569a90b0cc7bc7f313bc4625c2732d1bd05d825ad0ff49263a04e7c0cec7

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\4HAJQ22Y\favicon[1].ico

      Filesize

      1KB

      MD5

      44385673eef386ec121603cd302fd05f

      SHA1

      c15a6d61054ffb16d8df4da943b545349fc82631

      SHA256

      069e8a1e31aba074cc28bc9d6d54c67495bd42a02115dc232be7c8d9f83e40a8

      SHA512

      e80c43be006b5eeb66f98192b177163e92b75a5cd0aaa880ade24a67db7a1f29a0cb958b158244db47386cdc775dd025e0fc1f97e3d7adcddb76d347f3073da7

    • C:\Users\Admin\AppData\Local\Temp\~DFC803DC6EFFE405A6.TMP

      Filesize

      16KB

      MD5

      9438c79ad83a78f1c4ef54beccdb53b5

      SHA1

      cbcad78773b853dcc60996aaed6246462f25ae43

      SHA256

      82fa715f885d598b8152de15858b9a4b521e766c162255fcad313e06ab8757a4

      SHA512

      980aae8f0f22b16e892cf73ba85e92be6bbb0b4cda77b15286ed1e2e69be1dc8f6e0e58ecb02d10262a578d274186feb07a3db5e4d799df31bc996529e3628a1