Analysis

  • max time kernel
    105s
  • max time network
    125s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/03/2023, 18:06

General

  • Target

    https://fonts.googleapis.com/css?family=Cabin:400,700

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 16 IoCs
  • Modifies registry class 1 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://fonts.googleapis.com/css?family=Cabin:400,700
    1⤵
    • Modifies Internet Explorer Phishing Filter
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4268
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4268 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:3076
    • C:\Windows\system32\NOTEPAD.EXE
      "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\8OI4IV75\css.css
      2⤵
      • Opens file in notepad (likely ransom note)
      PID:2580

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\6K3GJRJ1\css[1].css

    Filesize

    462B

    MD5

    ce9cece84e50c8f57a2d7c9598903183

    SHA1

    56c38a1a4a8003d7d0dcb078b449a73a747cef50

    SHA256

    1d66ecfce6df8ec13bf9320a2d758a0268cee18a8427379e534d14ce4b097b91

    SHA512

    0f4e29c0d3b83b4924de7b3af11afdb06ea65dd84db5e861ff0740305eb9fa3a7c57da69268eecc26ee0ec52702596b7b690d8b7ac53df7a3ef4469d0431bf13

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\8OI4IV75\css.css.xludxt9.partial

    Filesize

    462B

    MD5

    ce9cece84e50c8f57a2d7c9598903183

    SHA1

    56c38a1a4a8003d7d0dcb078b449a73a747cef50

    SHA256

    1d66ecfce6df8ec13bf9320a2d758a0268cee18a8427379e534d14ce4b097b91

    SHA512

    0f4e29c0d3b83b4924de7b3af11afdb06ea65dd84db5e861ff0740305eb9fa3a7c57da69268eecc26ee0ec52702596b7b690d8b7ac53df7a3ef4469d0431bf13