Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/06/2023, 14:41

General

  • Target

    https://www.directindustry.com/tracking/rest/external/v1/redirect?target=https%3A%2F%2Fwww.directindustry.com%2Fmailing%2Funsubscribe.html%3FmediaType%3DEMAG%26token=f99b95d530b4041b98ddfc02b3cf1941bb03c676\

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 35 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://www.directindustry.com/tracking/rest/external/v1/redirect?target=https%3A%2F%2Fwww.directindustry.com%2Fmailing%2Funsubscribe.html%3FmediaType%3DEMAG%26token=f99b95d530b4041b98ddfc02b3cf1941bb03c676\
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2600
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2600 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2456

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    68922600a2ab5a655b71826013aeb3b7

    SHA1

    b89aada63b01c865f6db88571ee0a2e1c3bf57fa

    SHA256

    f48422a5bcbad8930c9e3f7ae5be8912e45952e4487ea1ed8bd2d7401cfc6120

    SHA512

    03cd8dbd29ecfdd07081bf9abbcba14c6b478e42b5c04a6fb157b392a5f0daaaccf747dff21c1de6f7b359a164201bc0eae739eb9f5a8634e7ca0b00b6a5bfee

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    404B

    MD5

    c046ccc2c05f59b0e23f7d963cf3eb10

    SHA1

    d2ae26bacd78bd076d5a972e3ed8df04d447b8ad

    SHA256

    5272178269277f96ff0a42340fd5430363dcc30036f8a4240986095dbc56d135

    SHA512

    18c62ec8a34987f221a7af74ccfb2672697c69d7f32fc9f1446a817c909c34dc39af4ef3e45abe8b8535a175a10ba4cfe134277a7c05f8b499ef124a202d4b35

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\7H82VOZS\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee