Analysis

  • max time kernel
    135s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-05-2023 12:49

General

  • Target

    https://firebasestorage.googleapis.com/v0/b/project-5452019751376282701.appspot.com/o/08WeekCarterl4.html?alt=media&token=e4d29158-9d80-4207-a7d8-2607b01e732f

Score
10/10

Malware Config

Signatures

  • Detected phishing page
  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://firebasestorage.googleapis.com/v0/b/project-5452019751376282701.appspot.com/o/08WeekCarterl4.html?alt=media&token=e4d29158-9d80-4207-a7d8-2607b01e732f
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:388
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:388 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:4836

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    Filesize

    471B

    MD5

    07016cdc594feecfe290545becbfb4aa

    SHA1

    24444840f000be99fd72c1ba38a562438ef40ce2

    SHA256

    d04b8eba1bb5f80734384331bf9591e1348bbc07256b2cdaaced7398a5632202

    SHA512

    98fe1e1eeeb54bf7467f51b09b2913ced06fba7838e6b362b2538937a328c7321d6bf564696a39facfb0885fcb9317ed1e81b49d769096a3f3d4343b2a60e9d5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    Filesize

    434B

    MD5

    5a03cb1e0f8acc96dc8f57ec8dfb1ebc

    SHA1

    3f8b66c8a467ace5d72856aeb15286ab7548adef

    SHA256

    9218bb7e6c21af4a1dab4586751f802af1359c72eb6d74b448061ddd1f0b01cc

    SHA512

    7ba2ede7e9f7871efad82a932e94a7bc08d7454ac9a1f2c0dcfdb6f98397581adb84276dcfd3ba367274cce70c40b9f7349ba2fa8d317ea2533a7fb6e7c4e3f8

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\P8NMKCW2\suggestions[1].en-US
    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee