Analysis

  • max time kernel
    30s
  • max time network
    24s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-05-2023 08:53

General

  • Target

    https://click.convertkit-mail3.com/lmu08qrewrimh0o393vtx/3ohphkh76x7q02cr/aHR0cHM6Ly9hcHAucHJlbWlvaWJlc3QuY29tL3ZvdGFjYW8vY29udGV1ZG8tZWR1Y2FjaW9uYWw_YWN0aW9uPXZvdGU=__;!!Ot-Ko5wnKoHzUzQBWQ!9UNcWvCUP_B2iFr5CDYpuCa8aLbp8sDjX272QmYoE_FSyxKxvds2hcXOgVO25tQmNWxIcwu3n03um9qxd3E2PpJo$

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 15 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://click.convertkit-mail3.com/lmu08qrewrimh0o393vtx/3ohphkh76x7q02cr/aHR0cHM6Ly9hcHAucHJlbWlvaWJlc3QuY29tL3ZvdGFjYW8vY29udGV1ZG8tZWR1Y2FjaW9uYWw_YWN0aW9uPXZvdGU=__;!!Ot-Ko5wnKoHzUzQBWQ!9UNcWvCUP_B2iFr5CDYpuCa8aLbp8sDjX272QmYoE_FSyxKxvds2hcXOgVO25tQmNWxIcwu3n03um9qxd3E2PpJo$
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4560
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4560 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2884

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\q7s3h6i\imagestore.dat

    Filesize

    12KB

    MD5

    a5b72f29576dd5b20f7eabd57c9197e7

    SHA1

    e3ae390c8247e1d0ea024da35f44644e83a0f907

    SHA256

    ee9112b19a7cb0a56e17b4feed2a5a0c11868f9c6a08211f9bb5873a551c1c0d

    SHA512

    23461d6f4664a33c5982b357bfca41adf8f8b88f2f64457d1ee2698de10975796ca2fbdc7ad03dc8a20fbc2e1646ad8f909a5e4703ab740014128dd68137d67c

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\K941J8ND\android-icon-192x192[1].png

    Filesize

    12KB

    MD5

    94c8aab5b0c4f6d6e2a14099336debca

    SHA1

    83db58b6134d30ce539ae002144ec07ad5c85b82

    SHA256

    b92b6e57162c2916b8a070dd8146553ee5c95093eee8eac83da5d7231da0babd

    SHA512

    9b57d1402dbef0e3f8a021194ea2360a13bf8b97592906a232a134ac9767011ebb61ddd1f79ff257f7eab4839ffd05c802bfa1e742359de994e85772a8b3e619