Analysis

  • max time kernel
    130s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-03-2023 02:29

General

  • Target

    https://jrsp-cmpzourl.maillist-manage.com/click/1c311a0864f9669/1c311a086414c2f

Score
10/10

Malware Config

Signatures

  • Detected phishing page
  • Modifies Internet Explorer settings 1 TTPs 43 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://jrsp-cmpzourl.maillist-manage.com/click/1c311a0864f9669/1c311a086414c2f
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1412
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1412 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1688

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\cz9baam\imagestore.dat
    Filesize

    15KB

    MD5

    cde3d8a5bed9e10d576538faf0aba89d

    SHA1

    955c2a265b6e1d594c04069d7dc2c2e3be9a69e1

    SHA256

    e8d9055b9d176f4b666927e147936898d44219856fb5ccdfacf6ac585fd574ca

    SHA512

    a1f7803e7956963806c96d5afaa8ea1171901cae74c7ec79fd1fa53cc31a19ec8ecb54a6a8ff8cbcff325276174872b00b37b35beaf4486abc87f5cafa78bd87

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\GPVLIKPI\suggestions[1].en-US
    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\RP56V4OA\favicon[1].ico
    Filesize

    14KB

    MD5

    3691a7e782c685b44023c9c4e3f3a31c

    SHA1

    68c2cfbe1233c391d73a16f3b10b763d9d491b7b

    SHA256

    9c39ab9b766f89b7c9c078fd0fa0f4c095931d09c505428e6b2cb3dd3f19a8a3

    SHA512

    b60ad86c8174b62439fd139ed820a0db4e705ae1254d8c444e89e153c962460f41b2d42fef9774db3740817013eb420c7b3fb09d3f41aa2756dcc10efba74683

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\RP56V4OA\jquery-ui-datepicker[1].js
    Filesize

    36KB

    MD5

    877cebff0e17fbd8669c7a12727c0565

    SHA1

    d331aaf21156762e45303578e362b2057784ea74

    SHA256

    50b6a3ab86ea994435c142c93b56441ba516e29f7c7ac29f28bf0e5a1ade97e6

    SHA512

    155ab7fc6b4b442106b4e4ba20f6c2ca182ac8b473ca5dcaa286127e9535f33c05af3c2c4dbcf55a0dd19dc67153e147f5b582649d07d49192526828558e33e1

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\RPW4GWWI\zoho_puvi_regular[2].eot
    Filesize

    50KB

    MD5

    cdda956b52a848ecb4d75cf91fea5737

    SHA1

    c7136eaa7579f4b662d819406ffe98fd2f4ac07a

    SHA256

    f74fb269f4339bcd84b3034bd6f48f8db6a60103084f4f17aec5396996c67bb0

    SHA512

    124d8c908654c3dc1749114522a3917f89a870ea71035539e9deada88e0634523018b15042bbd40003f69b4ecbeb61d8c353288908f1e0c8eade874abb86dd1d