Analysis

  • max time kernel
    135s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/06/2023, 13:47

General

  • Target

    http://track.smtpsendemail.com/9114690/c?p=1OhRKkd-ejtK6pVYMPVaLsbE4_YN0LlQSAwPid2Pu4x0TMxzGWvyG5xuMZLFxBC8DRrb3D2s0AKcpMYBqud43Mi98hsEuELYCZkvjGJCcwSG7a4F6extBDjEZh6Vhi-5ywH1WdqNZUiPIKlYuZ6xpP8_jmhouJVnwEe1zk7zraSFxhGAhwqENJM3kmJktTY8i6T1kqMG-7w5wJxyPzsG_a_lAhLF7XdR3Bk2RLiWyZ1zIxKBHrFkLouGrp04YUeF96O9T6r84ud4G5G7gTLWCNs9FdwKXv53bx-1k4IzYAfkRCBDLYy8jrPZ3f7NxQfc5r9XJ3nlu4NmiWzafv5UAXNzyrhtFha1rSO2ROlMe3o3IZBJqBSJOvXc6oijxpxVC_wz92oFlNn6rSfAKqMVRRJjsKp6NrC4fPqC6gWW9v7eMUmDg-2KsmNmwECjnJ-0tvKLWk5yzvw7c-T6ruaBS1KguER_H8gyvYpDhVYBtZxswogZuO7lt1m_m8_Czqrd_J8qZFo2WqWfmtQWN9VSFUxThLUYsFogx9mwro3vTzVQ_agILDo09lCa-xZu2-Gg

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http://track.smtpsendemail.com/9114690/c?p=1OhRKkd-ejtK6pVYMPVaLsbE4_YN0LlQSAwPid2Pu4x0TMxzGWvyG5xuMZLFxBC8DRrb3D2s0AKcpMYBqud43Mi98hsEuELYCZkvjGJCcwSG7a4F6extBDjEZh6Vhi-5ywH1WdqNZUiPIKlYuZ6xpP8_jmhouJVnwEe1zk7zraSFxhGAhwqENJM3kmJktTY8i6T1kqMG-7w5wJxyPzsG_a_lAhLF7XdR3Bk2RLiWyZ1zIxKBHrFkLouGrp04YUeF96O9T6r84ud4G5G7gTLWCNs9FdwKXv53bx-1k4IzYAfkRCBDLYy8jrPZ3f7NxQfc5r9XJ3nlu4NmiWzafv5UAXNzyrhtFha1rSO2ROlMe3o3IZBJqBSJOvXc6oijxpxVC_wz92oFlNn6rSfAKqMVRRJjsKp6NrC4fPqC6gWW9v7eMUmDg-2KsmNmwECjnJ-0tvKLWk5yzvw7c-T6ruaBS1KguER_H8gyvYpDhVYBtZxswogZuO7lt1m_m8_Czqrd_J8qZFo2WqWfmtQWN9VSFUxThLUYsFogx9mwro3vTzVQ_agILDo09lCa-xZu2-Gg
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4960
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4960 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1960

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

          Filesize

          471B

          MD5

          82b6e24e9d7fe90d647b5b81389401b3

          SHA1

          51f3af35027bc77cf6912e6dd3d6cc3289c19c55

          SHA256

          3483fda8fbc0fa1d77780c1c46e372c3bc834a45b19d149d0dbc8c2fba26322d

          SHA512

          3454b31c7111bdc0cf6ec133ef1dd6755abf0b006f77341b904fbb8ad25a81b548accc510f1590c2a3955f5bf86f8b023404e1acb9d2b028bb29067848936f7d

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

          Filesize

          404B

          MD5

          4dfa3b621fa75c1d96a4125128c55d73

          SHA1

          663d0692ce1a91e44c51a9c02c0a26bd6497b9e8

          SHA256

          8726f1323682371e3541e994d27b14716aa7a24522b750fd64fd5f1dc8a5afff

          SHA512

          f88b3b79c3425159c1eb3ecc5e975a67b744d93376a25fe9fe9b52d11af191b56a6cd398fc4ebc9783b2b7495ad017a989fdfef5de05f971d3c7f2c42a71a4dd

        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\phzg4yt\imagestore.dat

          Filesize

          197B

          MD5

          6ea1f912505d915776a5a315b1376132

          SHA1

          2abdd6513b2f1e3e58bbab7091c172495ef7138d

          SHA256

          0f882880a95139bff09e4edc339f7e86cd992946b06f1c0ec0d9ec98364e1ffc

          SHA512

          b6a5cbd1d2796119f361d1536752e95cc3a17ae6b942546ccf2b9a75ccc333eb553f31b1ebf230af9ae13624a0ffc531e1454b5adf8671db61f40db3f7cf8155

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\39K1WZBJ\favicon[1].ico

          Filesize

          37B

          MD5

          455005e2f4b8ecc484500fab08619f70

          SHA1

          e1e297d7dfdbb59ed7fc2f175827d5bb4d00840b

          SHA256

          b2e4d08754839510a3d77ddf8205a515e51e4277c323932b10441196744ce757

          SHA512

          b64f465a0341a5b964760de11f98b94ef91205922570d8d47f69c28a25e86ccf1b4a31a6646ce914d4bfd2b419c5f1f80b6a1abb8e3cc6be23871c1b2133b140

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\4VT6R2QM\suggestions[1].en-US

          Filesize

          17KB

          MD5

          5a34cb996293fde2cb7a4ac89587393a

          SHA1

          3c96c993500690d1a77873cd62bc639b3a10653f

          SHA256

          c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

          SHA512

          e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee