Analysis

  • max time kernel
    96s
  • max time network
    92s
  • platform
    windows7_x64
  • resource
    win7-en-20211014
  • submitted
    15-10-2021 09:12

General

  • Target

    Leschartreux_Doc#92543.html

  • Size

    421KB

  • MD5

    753114616924ea3beb30bf798201c81b

  • SHA1

    5e5bb4a48d4f6475ce3fe2eefcc06edd86ddc689

  • SHA256

    e72900fb5d2ab6efc96af426955dbb8076e6b6a5de4a2c6a4f373f80f8523e9d

  • SHA512

    dbfa5a2ad32c5bd87854b6e4b8591d7641363d8cc02acb3cdd744ea9282e921d9db7cd5bc6c5f04deb0c7bf65cb3b9f43f9d4a7137ad128f5c6a85a155500a01

Malware Config

Signatures

  • Detected microsoft outlook phishing page
  • Detected potential entity reuse from brand microsoft.
  • Modifies Internet Explorer settings 1 TTPs 46 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 15 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\Leschartreux_Doc#92543.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1684
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1684 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:468

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    MD5

    e2244d19498da4545b64e1f51127a709

    SHA1

    869e923011747c28c0b6f7c97caea245bcf9003e

    SHA256

    22eb951d597702d39b6b4ebf2b497ef02d08c910f385879f2cd3f151ed00bc77

    SHA512

    666b7da2d0ef9541af6c4ff3a07f75b4804aa301c03de4a1a31ebefb45beb9f3f9062f81d21e905f0fed4ae5c61dcea4ddaa03508d1ba88ca3e9df798885dbe6

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\r32q9i9\imagestore.dat
    MD5

    a523ba0d489fc2ba373523080aa5b581

    SHA1

    c707c7c331316979528ed8b3e3ac0a8dbab6800d

    SHA256

    7abc1698e0eaa5d0a467321ea64bac75651631a2c15ade8e40255c9865051563

    SHA512

    be60cc65720e5f9346b5e17f21ba42bcb69c7fb059106b5f0fe455e0b75f82da4b5f49353090f5d575730a20d0e86836b2e60bd6355d6d718bf38d4ed4980826

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\r32q9i9\imagestore.dat
    MD5

    db2d26443755be71d52484c0424d3d46

    SHA1

    d89681b28c3521a7fb289c6e5f8227c7485c074b

    SHA256

    53265ce130e824c231cb19ae72a37155864da1af21a52fe25c1fbd820aa98614

    SHA512

    f24d8f18dcc21ffee0461d88ba953220b45622d9a2c102c0b51ed267faafbee89f418f39f84c847dad25588208c3791ac11f0076c4481d66f20b47ed08fbd14d

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\S13LRU85.txt
    MD5

    3407fd5e9748c9ce77c23665dd617c7a

    SHA1

    b08a5e40bc7bcad650fcf0b1c2bbd8f047bccf48

    SHA256

    02cd8632d51abeefbd5a4eb38b4fe316fa6477ca8d5a12515164a477aa3ac085

    SHA512

    77fd710f41cf5fe713128df6aa04c9b63ee6750124f179a4428f4f9d55461fafb7cd2eefa32ac29d5d7af33aeeedc076453f2a011ac61f898b348362c9ca7232

  • memory/468-54-0x0000000000000000-mapping.dmp