Analysis

  • max time kernel
    86s
  • max time network
    133s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-03-2023 16:41

General

  • Target

    https://www.shareholds.com/nam/bc74e59c-5fa3-4157-9c37-6e5063d11a62/46c9cd6c-3abe-46b7-ab13-f72c14fca92a/0c6c38c8-9ee4-4b67-a840-417cd3ee9490/login?id=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

Malware Config

Signatures

  • Detected microsoft outlook phishing page
  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://www.shareholds.com/nam/bc74e59c-5fa3-4157-9c37-6e5063d11a62/46c9cd6c-3abe-46b7-ab13-f72c14fca92a/0c6c38c8-9ee4-4b67-a840-417cd3ee9490/login?id=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
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3240
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3240 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1564

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    Filesize

    471B

    MD5

    7e6edac4c08deaf3549189bfc3fb721d

    SHA1

    1bc71fc3691ec8fff202ef503f30c83673709055

    SHA256

    99600b86d6c324e84351dd8f09183150203c83df6188ff21104f3808e57adff9

    SHA512

    e5fe4d62400e6dd9d835111384b965a1ee33e72cf2f64724c22a535e133eb71196bce1566f9f2ed15c5965709e9e29c27bcf6744efc671bf406c9acd416946a6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    Filesize

    434B

    MD5

    5a43bce34811df2c3756810b4a33762f

    SHA1

    0db3bffbac5ae9dc0a30520eecfe42d12d3bac10

    SHA256

    dee5566b23dcbf47e36f8fc324ad0403870e69f043c17b0a749c7c7bd859eb37

    SHA512

    227e06dff359aaf5c559d9d4f3c9772a92719c9b151df9776cab30b6c6dfcaa6652f83cd79fe1fd23156b1b3a502de0a7736e3d40e80f1a2051b86facedd2766

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\4VT6R2QM\suggestions[1].en-US
    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee