Analysis

  • max time kernel
    45s
  • max time network
    50s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/06/2023, 13:44

General

  • Target

    https://storage.googleapis.com/msgsndr/on223RmJEcl9fY1OZrM7/media/63bdad50a6fc4eca4bbd2ecf.jpeg

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 32 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://storage.googleapis.com/msgsndr/on223RmJEcl9fY1OZrM7/media/63bdad50a6fc4eca4bbd2ecf.jpeg
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1748
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1748 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1844

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    82b6e24e9d7fe90d647b5b81389401b3

    SHA1

    51f3af35027bc77cf6912e6dd3d6cc3289c19c55

    SHA256

    3483fda8fbc0fa1d77780c1c46e372c3bc834a45b19d149d0dbc8c2fba26322d

    SHA512

    3454b31c7111bdc0cf6ec133ef1dd6755abf0b006f77341b904fbb8ad25a81b548accc510f1590c2a3955f5bf86f8b023404e1acb9d2b028bb29067848936f7d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    404B

    MD5

    18850c6050892e216fd527e469770716

    SHA1

    1b91a9c98ea92d3c4d342527828ff8109b249be7

    SHA256

    b4c957b1315bd84a6d2845ba2dbbab14322e5a4baff3c0ad77bfaa0e664e784f

    SHA512

    8e5ae61f361a01e30a8e36deef88f898a58360ee456f220f322d5b7fb91e43d14e02b8b112556cca7e3762344b273f2b87e8c492998cf6215ea6952b393ac9f0

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\cz9baam\imagestore.dat

    Filesize

    980B

    MD5

    ff8a43cbd8bd8bb76faa5cb2efee3221

    SHA1

    3f3971229baa5ccebc7964570d1fc2e413f6ac01

    SHA256

    fe28bd1c912ba9cf92f242778995a5e38508406fd4ac56f3438a005b033ebbf3

    SHA512

    c52415cb73c94b4cf230fcf0aad6ac0768745db926b965e717cf91b1a1c333a495c3a1ac7ab74072c8a2be864e98d3e547c0c631c85e020a58c4866fb84497e0

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\RPW4GWWI\cloud_storage-32[1].png

    Filesize

    850B

    MD5

    352549ece32e8183cb6792d5b1e7450b

    SHA1

    6c6ea952ec11c2026e828f0118bb9a58e35ccfbf

    SHA256

    24283abecab24b0a7f50518ef5e9c684b1abd4fdbb31c6d0e1ca63a236a34d1c

    SHA512

    5cc8c80095b2928eeaeaa987fee7769fc344a913f89d4505f38687d87916351dabea19883550ffe4b95b2e2802fee7297a9927c845f78dd5aa963bff06ae7eed