Analysis

  • max time kernel
    152s
  • max time network
    199s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    22-09-2021 14:49

General

  • Target

    https://attachments.office.net/owa/swebb3%40ccc.edu/service.svc/s/GetFileAttachment?id=AAMkAGMyZGMxYTk2LTAxYzgtNGI0MC05ZjRhLWMxZDdiZjQ4YzhhNwBGAAAAAADSfXBPFtZaRrCZKg7hgvNYBwBmNbXUTSwPRItnjHxuR2%2FqAAAABQ2wAADL7RfwKlEhT46jDSY4QhQxAADNRLzIAAABEgAQAFF1bG2XgXpDlbx0pIju5g8%3D&token=eyJhbGciOiJSUzI1NiIsImtpZCI6IjMwODE3OUNFNUY0QjUyRTc4QjJEQjg5NjZCQUY0RUNDMzcyN0FFRUUiLCJ0eXAiOiJKV1QiLCJ4NXQiOiJNSUY1emw5TFV1ZUxMYmlXYTY5T3pEY25ydTQifQ.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.cD63JOBKUydnutf5Y_cix06L6EeO4OmRK4RjP1311pObKLpsBv_IHTr12_OB-W4ZAMJxaKkFMhfIc8KtNVSTbB249eR3CWxP4VFBYJmJJMPOGwjEvcxq5Na5vBjr-XuyDYDjQDzuMzmmhyMU5fFsIxKYtFYy--lK6ScQiyYK0Wd6IVJS8W01POZ1VKop4LchGejFVHa906ZW4w9y3NUqmcEi-MnTBe886or-eaOw3M_VxQNGH7n4qG_aXXVAdWfNDhOxqWWZQUHPQAsVOwAxYxISN10CxgP0jSBL-425ss9fKEjV-8janQDENwtEb-d2QEnH8S01YKiCzJam7a3oOA&X-OWA-CANARY=orI5HeFpR0Ozi5FEsTjMBsCwJJbVfdkYGyWZAgUrFg1eojJ8oWROzbhX-D6NU1DoZFwm--iaKQk.&owa=outlook.office.com&scriptVer=20210823004.07&isDownload=true&animation=true

  • Sample

    210922-r69tfsffbp

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 49 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://attachments.office.net/owa/swebb3%40ccc.edu/service.svc/s/GetFileAttachment?id=AAMkAGMyZGMxYTk2LTAxYzgtNGI0MC05ZjRhLWMxZDdiZjQ4YzhhNwBGAAAAAADSfXBPFtZaRrCZKg7hgvNYBwBmNbXUTSwPRItnjHxuR2%2FqAAAABQ2wAADL7RfwKlEhT46jDSY4QhQxAADNRLzIAAABEgAQAFF1bG2XgXpDlbx0pIju5g8%3D&token=eyJhbGciOiJSUzI1NiIsImtpZCI6IjMwODE3OUNFNUY0QjUyRTc4QjJEQjg5NjZCQUY0RUNDMzcyN0FFRUUiLCJ0eXAiOiJKV1QiLCJ4NXQiOiJNSUY1emw5TFV1ZUxMYmlXYTY5T3pEY25ydTQifQ.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.cD63JOBKUydnutf5Y_cix06L6EeO4OmRK4RjP1311pObKLpsBv_IHTr12_OB-W4ZAMJxaKkFMhfIc8KtNVSTbB249eR3CWxP4VFBYJmJJMPOGwjEvcxq5Na5vBjr-XuyDYDjQDzuMzmmhyMU5fFsIxKYtFYy--lK6ScQiyYK0Wd6IVJS8W01POZ1VKop4LchGejFVHa906ZW4w9y3NUqmcEi-MnTBe886or-eaOw3M_VxQNGH7n4qG_aXXVAdWfNDhOxqWWZQUHPQAsVOwAxYxISN10CxgP0jSBL-425ss9fKEjV-8janQDENwtEb-d2QEnH8S01YKiCzJam7a3oOA&X-OWA-CANARY=orI5HeFpR0Ozi5FEsTjMBsCwJJbVfdkYGyWZAgUrFg1eojJ8oWROzbhX-D6NU1DoZFwm--iaKQk.&owa=outlook.office.com&scriptVer=20210823004.07&isDownload=true&animation=true
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:396
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:396 CREDAT:82945 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1196

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_1941775A515122A167E3FBACF08992E1
    MD5

    8faa2f19a3e340bb19b7ea7b3fd45663

    SHA1

    a01311874a3baac502d45b56c951d9bb994dbe08

    SHA256

    37bc57fca367bae17aaaa0d5a7cf4ec07deee41f23d1a5a14ecfb31ab66644f8

    SHA512

    1e31bd6e91714f7178cd5a55ad4ac78a63619f9e994bc45610f644201a1e69133fb96d58c52f2403e7fbedffa0d92d5730da28148df94c235e0e4ac2e4297dbd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    MD5

    6184b0e7016067db51a6ecf5f3fec69c

    SHA1

    d95dc8253b3f7ee8eab391a9933de56929b7b9a8

    SHA256

    f0310616d9b89c76451b430a7849df7d6de967e7be98d4db98b18b13fd0d4c24

    SHA512

    1d5a39ff7c1a9896999b5a571ac198c8c7c667737f9970d1b81c49b6d20925bc800df7b5f2cc890a079646bcf8e7aba25934018e55cf555d1873f0f19dbf05c2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_1941775A515122A167E3FBACF08992E1
    MD5

    cc74fa8631b8d67c9848576d23e14f22

    SHA1

    824d16010670a14bf85f7fab0025143e1af1dccb

    SHA256

    34aea7219354451adc5551e595e3c36ae5dfe17dc43e440ae72102f967000dee

    SHA512

    eb5dc89d54f57daf635befa2ccfa0730e1e2e7a0fb31e6c2134bebf14251eec24cfe310e1d185c8057f13d48554c98b1f2da6811018901b227f4940389ecd698

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    MD5

    2ddd736a972b2aa542ddd92149f57223

    SHA1

    27d72de7cbb862c1d152046b9f2df1ee0ff5cb85

    SHA256

    31fede432c32bc9f62ec95fd0bf7e7e262b4e515b29ba1741cf09fa295f2207b

    SHA512

    2897199cef5ae78dffee59b062bbb08070ccdf7b9b839a4483bdda49e04c4de0a113b6f1512b264f9befd3448497aec4a9ba2a78295d8fe4ca39d80dba49acb8

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\D8TL527O.cookie
    MD5

    51b95b6532e2a5052f5b6cbaea3d88ad

    SHA1

    ce956ed84f7515a4a91a5386bd3db255921d6cdb

    SHA256

    bd8c5023cd4863c25f7e18e277a6c37df514a98e84410b0d6e8c6099cc5e6584

    SHA512

    0dfa4c8685296e88f15c333bf874cc0712ad9b2ee8dd67f5ce620b98a58ff0b79194b449abc5de59798de3492d7ade093d855918cb6e8a52b4e5f4a72ea5bc75

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\Q0YHMBVC.cookie
    MD5

    44527248a3a0034abab6c4b7083c190c

    SHA1

    565aff2a3c6e6bcb06061d64e849fec4b4dbf01a

    SHA256

    3aaa30c14e123c75d66453ba4bf3006ee308c6a51d5bd46ba0c886995df28571

    SHA512

    87bb3e2cac90ab850f145d7e42419e5fe14dc1207add95ee01ce4375c6dc44fe99f4a82f9b4f657a85dab89e80164d9b4e4e83ef41387812d7b7c63f85c14367

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\X52XIQPT.cookie
    MD5

    63a28cfcd92ef0fe90f1e9cab60f07d8

    SHA1

    36cf0ed72ffa0d8adf6f66c71d4c9c8760241250

    SHA256

    0d4505a28a2e1042de42ca29e23269c307eddd7c2287412a6f230753a40c7d5d

    SHA512

    842eca86e38fa87f3d016f9b4230cc02df785948848758b1f347b8b51af73ec09d81a3f9488d58d531c6f9998414b4b3be9d4d070db53e1a083cf886757e2db9

  • memory/396-114-0x00007FFFB4420000-0x00007FFFB448B000-memory.dmp
    Filesize

    428KB

  • memory/1196-115-0x0000000000000000-mapping.dmp