Analysis

  • max time kernel
    82s
  • max time network
    87s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/05/2023, 09:29

General

  • Target

    https://growppc.com/uzytkownike-mail/

Score
10/10

Malware Config

Signatures

  • Detected phishing page
  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://growppc.com/uzytkownike-mail/
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3084
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3084 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:1072

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    c21444748ba8f51ef6ef531f3b4e2f68

    SHA1

    af1907ff43ab2c03e0c05044017533cb6eafff5a

    SHA256

    9d80886561b2301975168964509698c1f96e0ec7515a553a34b6a78690065563

    SHA512

    bbb8f887d412ca48ea707315135687e5948bfd3f666b046a13a392aca9edb146d85c99516c4f8985c94e8ba777ca1b09a4fbea5358da72041424ed6334d2ed5a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    434B

    MD5

    c74e801fad914477c374c67d39bf5626

    SHA1

    68e6eb6d512b211fd3944d295edb70d0eb4a46f0

    SHA256

    18cb2aecd0c90215e2ce911f4c27d26680c8fac7041eb42f4a79fc71c3204193

    SHA512

    0a3dd210b5c08fd83e69591cd0c1f6d1498ca979628348bd7aad95ae099cde5f2ac1e85adceb5af5de86f516e441606516875a8adf8054d71128fe0788654f90

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\q7s3h6i\imagestore.dat

    Filesize

    34KB

    MD5

    68125493c4815e0fbd59eaebebabfd20

    SHA1

    65447e79def65c612c078dcf1fed67226eaab567

    SHA256

    c8418d8bcdd5508be12b10f1dfe4f07eb44069c90664bd9b563498d98a0f425d

    SHA512

    24b7ee2789610fa8d9ff44ec6d471766542601010fe4962eb7d07d6ec2760ad6386156327362d45b59cb557d18fc1655dece862265aca15d5788e315181a48a7

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\q7s3h6i\imagestore.dat

    Filesize

    51KB

    MD5

    0743d27b66a11401e7a9c3e4e66b646d

    SHA1

    fa77a010cac48c20b70c0806212adced505ddf7b

    SHA256

    ca7ed7fbe5c62a53d93e0039a175f5e95f3ca4c3375e2b10de9c48b337faddf6

    SHA512

    52da5a50c9dabc1e61ff1a5dc25e24e65dce2c071190e544b4db8abfd4d14ef222d4bf404fabb1cf645d25ca7826cd80ce8f2968e8074ce65b980349c51fb983

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\q7s3h6i\imagestore.dat

    Filesize

    54KB

    MD5

    c9f8671ef192c0e150e677ff099d72a1

    SHA1

    c7d139d37e16b623a64a79b904817effa1c923ff

    SHA256

    df223b79293c4288559237933b64b94eb489c3eadb4ed171f7814b5f8742cdd2

    SHA512

    1a863c16c3110fb0a2dd7bb7b55dd39a1438a1fd87c5490bdcedcfe9f58abb3c6e72f52621ef8687a2855a09e7d362f01e70d45b4c5394e80b9048158d65427c

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\q7s3h6i\imagestore.dat

    Filesize

    54KB

    MD5

    c9f8671ef192c0e150e677ff099d72a1

    SHA1

    c7d139d37e16b623a64a79b904817effa1c923ff

    SHA256

    df223b79293c4288559237933b64b94eb489c3eadb4ed171f7814b5f8742cdd2

    SHA512

    1a863c16c3110fb0a2dd7bb7b55dd39a1438a1fd87c5490bdcedcfe9f58abb3c6e72f52621ef8687a2855a09e7d362f01e70d45b4c5394e80b9048158d65427c

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\0BMP3ERH\favicon[1].ico

    Filesize

    33KB

    MD5

    ef9c0362bf20a086bb7c2e8ea346b9f0

    SHA1

    fc3ef03acb552dfe09279dccadd99ba8eea5217c

    SHA256

    20c30fd4340308d6a4ab222acae353fc2460793ac76645bb1ef1d9d61f4f0a9e

    SHA512

    f2393626825e041755d9bd7c74f73be658d6e7febff0e39a97b807f30798123d0e75db1d5c3550ddf885fe8ceac375c2aa900f8741ae25b15e18304fa2295779

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\0BMP3ERH\favicon[2].ico

    Filesize

    16KB

    MD5

    f8b110d87f0c7ea8c1d151846dbe8849

    SHA1

    8b567892539bc84cfc881982be1068f945c67c5a

    SHA256

    fdb649f13bacfa21b47ec7481b775379e58137a52a5532f00678f8efbd70fbbb

    SHA512

    33021f28d4a40982909369773f342bb390cb3782ca1f23a8bf9d94b2fc7acaa1910a07a0efdd5c7fe80403600dc406431e15761d976c0e5440045db7bfe8ac23

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\Y624AVVJ\growppc-icon-50x50[1].png

    Filesize

    3KB

    MD5

    5d3e474ee4194dbeafd58cbdb4341943

    SHA1

    6e1226f9a78d22c48cfa8a568a8c5e10b134595c

    SHA256

    e9aee16c5aae61a71c9a824160403873184379dd0e409be6891cfa85ef7d3b86

    SHA512

    35b139ec04749560571864c1521326d65fcc093417eda1ade79206674184da4798ce4b690d8f2ca540787e86101696e5a19cc4d0ccc110db27ab4441ffba08d0

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\Y624AVVJ\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee