Analysis

  • max time kernel
    106s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-03-2023 10:37

General

  • Target

    https://jrsp-cmpzourl.maillist-manage.com/click/1c311a0864fa39e/1c311a086414c23

Score
10/10

Malware Config

Signatures

  • Detected phishing page
  • Modifies Internet Explorer settings 1 TTPs 43 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://jrsp-cmpzourl.maillist-manage.com/click/1c311a0864fa39e/1c311a086414c23
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1924
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1924 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:4356

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    d1c2394de328e8fdd746f216fd625c7c

    SHA1

    96e662fd61c6829b5df3c952d0f2606019351b90

    SHA256

    b7120a9fe17c0dd07d7dcf3abcfbb8575d8eefa072b580a9276bc187fa5b9050

    SHA512

    ac10db7cf61cf8ce9012cc8dc837288208be2f481f737db984d5afe1488717f46140d0cafaf30254ca5a8600716a1620ebf278dacdab629148cbfb9f4731cbd9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    434B

    MD5

    3b737d1d85295aad5f40177d89972b86

    SHA1

    4d35690ce08d046f72fd69dcdabaed9c69113c43

    SHA256

    5208b26b28eb96facae7a72752465b7a373193e2efef7bb6119cd02514cd8629

    SHA512

    7c1f82f68adc35d1b1a93ee80cd4879c83dc43a5d849412b34ac006eb7dda2f7185a15a60ef4e408c74869da19d69504082c06d5c00443aa2cd607cfaada28e1

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\phzg4yt\imagestore.dat

    Filesize

    15KB

    MD5

    28fb4919e2929023b77297145659e03c

    SHA1

    fb361ee40e72841b23c666f7ba754461dcb90bcc

    SHA256

    fe9ea5ea4a7d1202f6eb218650f34aab2dbe932b6a1f0f14d446fe1c83f58e6e

    SHA512

    6a863cc7d3dedc672a34d17fe62112bcda156ee8bac2ae27a530ee76a209b4c4e5be08185770295cea5a6b8c66a28f55ba66ba2696bbe2b00f418ca13c02ef7c

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\4VT6R2QM\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\U4IULL1L\favicon[2].ico

    Filesize

    14KB

    MD5

    3691a7e782c685b44023c9c4e3f3a31c

    SHA1

    68c2cfbe1233c391d73a16f3b10b763d9d491b7b

    SHA256

    9c39ab9b766f89b7c9c078fd0fa0f4c095931d09c505428e6b2cb3dd3f19a8a3

    SHA512

    b60ad86c8174b62439fd139ed820a0db4e705ae1254d8c444e89e153c962460f41b2d42fef9774db3740817013eb420c7b3fb09d3f41aa2756dcc10efba74683