Analysis

  • max time kernel
    132s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-03-2023 06:25

General

  • Target

    https://jrsp-cmpzourl.maillist-manage.com/click/1c311a0864fa39e/1c311a086414c1d

Score
10/10

Malware Config

Signatures

  • Detected phishing page
  • Modifies Internet Explorer settings 1 TTPs 43 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://jrsp-cmpzourl.maillist-manage.com/click/1c311a0864fa39e/1c311a086414c1d
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:5012
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5012 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2252

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\cz9baam\imagestore.dat
    Filesize

    15KB

    MD5

    dd5a8c083ea6916b5d3560b9034ccf10

    SHA1

    d7e2c13a391de2405deb3d049b28b8d3cdb022f8

    SHA256

    d9a8c295c4438b659ab193a96657202cf09da661cc91cf4aca35e3b97afe8578

    SHA512

    cc44db8dad5b3625137bf24df485d7004892b4b068cb1e03719e39ff1e12a0bc14d7da98ecbf8f4ba7e75bca90c590f31d4e1b2e0b35ef711629c338721eb39e

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\RP56V4OA\ipcallback-new[1].js
    Filesize

    175KB

    MD5

    9fe910ae1b1b29df980d44602b74f9ac

    SHA1

    3c4fcbba8a8cb5e91968a9fa598c67240bbcf721

    SHA256

    772af5d8389827432dcb15d476fa289a6419b241a5fa0d9dfa3008ca75d5f1a7

    SHA512

    ccd4c1cc7b54b66fc038893e1e7fbdc3871aa54471cc4ee5e377a0cae3b500f949f3d38a2580364ccf7132e91de6fef2c7bf2657409df97eb37b12cbb9a67ef1

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\RPW4GWWI\suggestions[1].en-US
    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\RUOQG7D6\favicon[1].ico
    Filesize

    14KB

    MD5

    3691a7e782c685b44023c9c4e3f3a31c

    SHA1

    68c2cfbe1233c391d73a16f3b10b763d9d491b7b

    SHA256

    9c39ab9b766f89b7c9c078fd0fa0f4c095931d09c505428e6b2cb3dd3f19a8a3

    SHA512

    b60ad86c8174b62439fd139ed820a0db4e705ae1254d8c444e89e153c962460f41b2d42fef9774db3740817013eb420c7b3fb09d3f41aa2756dcc10efba74683