Analysis

  • max time kernel
    39s
  • max time network
    42s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-05-2023 19:48

General

  • Target

    https://mandrillapp.com/track/click/31047859/myalumni.mcgill.ca?p=eyJzIjoiNUxZX3ZaZ29fY2xFVjdNNmliVGdxX0RXTlZzIiwidiI6MSwicCI6IntcInVcIjozMTA0Nzg1OSxcInZcIjoxLFwidXJsXCI6XCJodHRwczpcXFwvXFxcL215YWx1bW5pLm1jZ2lsbC5jYVxcXC9yZWRpcmVjdC5hc3B4P2xpbmtJRD04MDU4OTAmc2VuZElkPTIwODY5OSZlaWQ9MjI4MzAxJmdpZD0yJnRva2VuVXJsPWh0dHA6XFxcL1xcXC9EY2NjZC54eXotd2VsbG5lc3MuY29tXFxcL1MybHRZbVZ5YkhsR2JHRnVaR1Z5YzBCa1kyTmpaQzVsWkhVPVwiLFwiaWRcIjpcIjA4NWE1YTU3M2RjMDQwMmY5ZDE2MzhjOGQ1MjllZTQ2XCIsXCJ1cmxfaWRzXCI6W1wiZDU3YjQ5NmYwMDA1YTY3YTM1YjIwMDQ1MzhkZGEzNWE3ODQ3MDg3NVwiXX0ifQ

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 14 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://mandrillapp.com/track/click/31047859/myalumni.mcgill.ca?p=eyJzIjoiNUxZX3ZaZ29fY2xFVjdNNmliVGdxX0RXTlZzIiwidiI6MSwicCI6IntcInVcIjozMTA0Nzg1OSxcInZcIjoxLFwidXJsXCI6XCJodHRwczpcXFwvXFxcL215YWx1bW5pLm1jZ2lsbC5jYVxcXC9yZWRpcmVjdC5hc3B4P2xpbmtJRD04MDU4OTAmc2VuZElkPTIwODY5OSZlaWQ9MjI4MzAxJmdpZD0yJnRva2VuVXJsPWh0dHA6XFxcL1xcXC9EY2NjZC54eXotd2VsbG5lc3MuY29tXFxcL1MybHRZbVZ5YkhsR2JHRnVaR1Z5YzBCa1kyTmpaQzVsWkhVPVwiLFwiaWRcIjpcIjA4NWE1YTU3M2RjMDQwMmY5ZDE2MzhjOGQ1MjllZTQ2XCIsXCJ1cmxfaWRzXCI6W1wiZDU3YjQ5NmYwMDA1YTY3YTM1YjIwMDQ1MzhkZGEzNWE3ODQ3MDg3NVwiXX0ifQ
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4952
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4952 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:3816
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4952 CREDAT:82962 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:4188

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27

    Filesize

    1KB

    MD5

    193dfb673cd9fca38d4de32acb04d94d

    SHA1

    e1501e520919814d52a176a38258260b5cb2f189

    SHA256

    b37c58d2e2d4714091cabfc912fe445f07bc308d178d34252a225e952ab944a6

    SHA512

    b0d52ec51bff7de0039559212856c16523968f95e7a05309f7919ebdfb6916fea7cbf721c59e32ef1e66002cb4389e3ca061d7c54b5f17704d4b5c37131783a0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    3fbb8ee33354096d9f116c557a402d14

    SHA1

    f75756c42d45d1047eb04fa54bd7702f5560df4b

    SHA256

    13e2696561dd0955e1d61f7e18166c8bd7a02faf1dbfe04e738b5d68cc2ca57e

    SHA512

    cc21e56f9278282b3c15964b5618d42bdfda83b245d7bf01d12550aabd69a9747d1deaa5a9a9830e6d6a47465f580e21e0a7621cf992b56244ad4bee8779c338

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27

    Filesize

    438B

    MD5

    784189f34d27557e23ab4f5c0653989a

    SHA1

    03cc8b2e61413eedda490cbb28b5db4fd014ea99

    SHA256

    da04abd7f5c5e4c281c8b30b8583476d94a55ce74b9894c1e11bc0b8168a818b

    SHA512

    68707c7c7448501bce92150aa53f0b94260c3b9c671fce73e490e77738556fb9b3c71bfc8f4edba48cbd0b75da89de5ad951a4f704ec046cfbc42d83522768ac

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    404B

    MD5

    eba030abb94cc8f88330ee1047725295

    SHA1

    3e2cdcaca7902d45e47d73277c1b46f9e89185a1

    SHA256

    64c2e0a333e787c4013f109325bc7cf56fcbc6ca2d74dc71a89d98b51f2243c0

    SHA512

    1a06845685b5ea834870b93f3c4b9edbf015efac20113ce8b85552ea17e122569f680ca97124b68aa260f58d0d0f4506bdba8ac56fe7f8b39765de996157fdd4

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\0BMP3ERH\challenges[1].css

    Filesize

    6KB

    MD5

    2c78b7f8fa496092bf41d5edd51611e7

    SHA1

    8b0b1b276e8194b0a5497db478ec2ea9b4f83c42

    SHA256

    2b0bd09c1cc7119d27e45353a59bf6c2721563e1689853ff704057a7439508d2

    SHA512

    53a7750ea46082968c2ec557857ad3975cddb0b45595259f0f3e9fc16360b87c5f257e058489ecaf80e61a97f92f1c5e34fa2f6fcfe922f4ae22392ffd75b4da