Analysis

  • max time kernel
    98s
  • max time network
    130s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/03/2023, 14:33

General

  • Target

    https://click.send.grammarly.com/?qs=12812734fa45c845f7f492c33174b91ae63dbad8def6874c3e1fb04c874bdc17201a7283464d6aa5d28aca7dd91a4a549f6746be3701f37d

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://click.send.grammarly.com/?qs=12812734fa45c845f7f492c33174b91ae63dbad8def6874c3e1fb04c874bdc17201a7283464d6aa5d28aca7dd91a4a549f6746be3701f37d
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2084
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2084 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:4376

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DomainSuggestions\en-US.1

          Filesize

          17KB

          MD5

          5a34cb996293fde2cb7a4ac89587393a

          SHA1

          3c96c993500690d1a77873cd62bc639b3a10653f

          SHA256

          c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

          SHA512

          e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\9afmek3\imagestore.dat

          Filesize

          5KB

          MD5

          384c60b7317a133a78cc4bce2e42aa74

          SHA1

          91666cb52f11cb67139cce95f28ad1a3809a82a8

          SHA256

          24dde1d448be64adda2f0d07a8fbd162b26fc3d416f8d7b871a53568f5265b6c

          SHA512

          867ea709d7895a58238ccfcaeb028a57b2024f3ab6f85dd8e2f770edcce4097bca554ec3c21ddb034086fdee0a6257d41de4f8fe5afa3f17a2dade9d253f6e2f

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\G1ORIWBN\favicon[1].ico

          Filesize

          5KB

          MD5

          dfa85bb1fd633c2ab91c0fe07586da95

          SHA1

          d83abdea02e3dc7f9b84841fec376fa378c0aec8

          SHA256

          0d3b03b6b3a5d8d93f2e8e420352906459a9df4a19a34accac281e7ef1d07856

          SHA512

          4904e784ab20b9a14bc4423176df9f7830de254619af574e20151ee9831c1e11e6e5b34a7b816bf75380c4d2d1d3d0330154d13d1745be63edae20048b32758c