Analysis

  • max time kernel
    143s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-04-2023 15:54

General

  • Target

    https://www.mkt.maccosmetics.com.br/effectivemail/retornos/Clique/?hash=6T19q9E1huG6%2bDjxTT8kGI5FBo6sUGeTF3iOapI3LYIboeISAO8cRurwXNhaxrK1uN9C2KisACmHet2ZvIkxzcruHMbgyaC4W76kqZyovfsGh4oDWS6q8i0Y11lP25Y50tVmn%2bQJeOCByPOO5cGa0L3z%2fn9rbH1b5IQsbo7vH5rMskvB83vOmb68cbPeAexW8gMrtqxPpijH1ZBSAM%2bTKXbI%2fRZD%2fCbXMad4R6uy3OxbBObOmmVeMW%2fOa3%2bH7nhCvrO4Z9oDdyxY1e1yuN42Pv%2fg%2fGNeq0InFsM49gyI7ASZJiQeL5sGRge8keR7jdl91cE2rdZl7ZjDouqLQ1LyDRDxG4Yp%2fAL%2fB46KyTwFlrJ81jCDtBjVR8z81M%2bay74jSQR5WQ5BnOKLaYr3HYOu1MVHv%2fdjGu4%2fHpGbegT0KzujUu9lyceDFJ7vIdvwcJYV

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://www.mkt.maccosmetics.com.br/effectivemail/retornos/Clique/?hash=6T19q9E1huG6%2bDjxTT8kGI5FBo6sUGeTF3iOapI3LYIboeISAO8cRurwXNhaxrK1uN9C2KisACmHet2ZvIkxzcruHMbgyaC4W76kqZyovfsGh4oDWS6q8i0Y11lP25Y50tVmn%2bQJeOCByPOO5cGa0L3z%2fn9rbH1b5IQsbo7vH5rMskvB83vOmb68cbPeAexW8gMrtqxPpijH1ZBSAM%2bTKXbI%2fRZD%2fCbXMad4R6uy3OxbBObOmmVeMW%2fOa3%2bH7nhCvrO4Z9oDdyxY1e1yuN42Pv%2fg%2fGNeq0InFsM49gyI7ASZJiQeL5sGRge8keR7jdl91cE2rdZl7ZjDouqLQ1LyDRDxG4Yp%2fAL%2fB46KyTwFlrJ81jCDtBjVR8z81M%2bay74jSQR5WQ5BnOKLaYr3HYOu1MVHv%2fdjGu4%2fHpGbegT0KzujUu9lyceDFJ7vIdvwcJYV
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2240
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2240 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:3244

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    b3190077c7c84e2cfa647d44e0d7babb

    SHA1

    da898c8fe5d577196138df0b9857402ff931902a

    SHA256

    ca611b5f7c0759d63dc8f7d2ad6040bbca506e6d3249d4deb6432a5c8fcb855b

    SHA512

    f64b904af24f47cfd7967fcbe65adeb4379ae137e8cee5833134edf80729977f417f71b70174da3ac0ee26d34567c072e9f988a687b7d1e3331341cd4911df24

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    404B

    MD5

    735fc09d81d51bb680a0001bb5ab88d5

    SHA1

    8437573d82af01ed465a45de53511c9904c568b2

    SHA256

    ffce1432dba9b63ee6817af0384dd6a48a1b7004ebca1e629f57479513fa691c

    SHA512

    de14c2c56a0c43a9bf39f674aa2bc83173341696df4dc5fc3264e0c598d2d56e6a4aded479e0fe578b6c40a791302f5f0a43efef4ebfc64a5f5abaa5c99b65d3

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DOMStore\GM547IGU\www.maccosmetics.com[1].xml

    Filesize

    13B

    MD5

    c1ddea3ef6bbef3e7060a1a9ad89e4c5

    SHA1

    35e3224fcbd3e1af306f2b6a2c6bbea9b0867966

    SHA256

    b71e4d17274636b97179ba2d97c742735b6510eb54f22893d3a2daff2ceb28db

    SHA512

    6be8cec7c862afae5b37aa32dc5bb45912881a3276606da41bf808a4ef92c318b355e616bf45a257b995520d72b7c08752c0be445dceade5cf79f73480910fed

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DOMStore\GM547IGU\www.maccosmetics.com[1].xml

    Filesize

    178B

    MD5

    f98972703f276c82d0fc99205a7e572c

    SHA1

    82277824b85dac9a935005334d142043a89e0083

    SHA256

    0ba7731e2fca1a7ee08a06ee4bf31ef0da9249d051c6f7b9353de00730d198da

    SHA512

    715c5fb7a360ccb26e7d7ba4b809333910630e027187472a44f9d667805c09f96b70963c3516d77ac8904a463168d8aac997afd743d959d5fb5c8a62a29d9523

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\phzg4yt\imagestore.dat

    Filesize

    419B

    MD5

    42ce5f7558be7ee9e6488cba9bf9cbe0

    SHA1

    e136e43178c4ea46c2dca02db0cc71ad0eaccc15

    SHA256

    9ccb01a3f41ab453e37cd4469f99398ca5d6fe2e4ec819454f3dcaf5ef01c15e

    SHA512

    f9a3fd55b817c6b7277802c73026d8f448ab8970533629b9801327a1f4421b8282b8430f58fd9c4dd4f2b0c7ef11d45bf709d23c98e14ef75e06af2e3b4ffc18

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\39K1WZBJ\favicon-32x32[1].png

    Filesize

    205B

    MD5

    f9fa83815a32357c069ef24807069495

    SHA1

    9e43ea2ae2f6c075368ab781560d695d2bb7897d

    SHA256

    55588d7243534726b2e610a2a510c1ba423cc1693a1d81335e3a790249dd3780

    SHA512

    b4e348cad30408a8f40bcb4c920d270d243503f6d2695dc67c7729ad759ee1dbdd800bde58e91b6d2feb2b6935915244639224142056dbf84ea47f82947f82f2

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\39K1WZBJ\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee