Analysis

  • max time kernel
    51s
  • max time network
    53s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/05/2023, 17:26

General

  • Target

    https://msn.com/en-ca/lifestyle/rf-buying-guides/redirect?rf_click_source=list&rf_client_click_id=000000000&rf_dws_location=&rf_item_id=502238318&rf_list_id=3519472&rf_partner_id=353781453390&rf_source=ebay&url=aHR0cHM6Ly9mODQzNDM3ZS5hZWQ0YjU5OGFiN2QzOGZlZjFiN2UzOTAud29ya2Vycy5kZXY=

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://msn.com/en-ca/lifestyle/rf-buying-guides/redirect?rf_click_source=list&rf_client_click_id=000000000&rf_dws_location=&rf_item_id=502238318&rf_list_id=3519472&rf_partner_id=353781453390&rf_source=ebay&url=aHR0cHM6Ly9mODQzNDM3ZS5hZWQ0YjU5OGFiN2QzOGZlZjFiN2UzOTAud29ya2Vycy5kZXY=
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3888
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3888 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:3396

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    c8acc7ebd0274710ad136e9ebbf77b30

    SHA1

    d99222d014b6694013aca886e37094c480120566

    SHA256

    5faffea9fd8c3fd5cccb9acb4fc3dcda1b50e9f69e382acb3e07c893918a53d5

    SHA512

    8f030769ed0daa410468084783ec029e4a26697b8c684c18d270c459b84ca9b2359511540e37db2b35561893d72c314d273af066b623cbb3b49e7cd28ce2ecee

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    434B

    MD5

    d9d0966e338d9cb24e7c87ddcf10ae4d

    SHA1

    79b7fa79cd56c1a137f91aff3fb8124c2becd188

    SHA256

    031d535c92b1b04e8ae6ce7724c15687cd16aef28a5370431d8b85fc7297597d

    SHA512

    521d5e9cf85cc1ceae6f71307f35fada7cbe3f020710708fb0743618a1469ea048b3e77f46bc06707baa95ee3dde05da0d121dbbf80c327c1f7119a61b5cd4d6

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\UUIKWEAJ\hcaptcha[1].js

    Filesize

    290KB

    MD5

    2eab5832c49b7a46b68eae89177f5728

    SHA1

    27071dfbedb99d5b7955bc478636170b10cb9eeb

    SHA256

    a26d35a57845c86f97d7d556909912417696485b97586e999e286be9ccd1cff0

    SHA512

    e042630c044688efd5f575f6e88a48b1431ccddcc2e849757f3e11a7ec972252a2eafbbd2f19f26054b41bd200f70d06a695731afb77ceeb8f1c1e51c84feaef

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\WPCK8CWE\favicon[1].htm

    Filesize

    426B

    MD5

    ca31234c1d922b535a22516150d812cc

    SHA1

    7f67a8683b36937b6bd4a6db005de76339eeb92b

    SHA256

    d782e3496aeb061dd392de9e7271d2105dc7639aef19176c32cb6bb8a8ccc0f5

    SHA512

    500aac98ea69c604468bf9364685e2cf9d19cda6c3d82ae7ebbd538c4bbffb6928a428a902a781055d4d36553a4148ca2979b17fa8409d3c096c2462e172904c