Analysis

  • max time kernel
    1200s
  • max time network
    1202s
  • platform
    windows7_x64
  • resource
    win7-en-20211014
  • submitted
    09-11-2021 16:32

General

  • Target

    https://onedrive.live.com/download?cid=540EC15E17DE966E&resid=540EC15E17DE966E%21107&authkey=AJ34FnCVandAjGQ&em=2

Score
5/10

Malware Config

Signatures

  • Detected potential entity reuse from brand microsoft.
  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://onedrive.live.com/download?cid=540EC15E17DE966E&resid=540EC15E17DE966E%21107&authkey=AJ34FnCVandAjGQ&em=2
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:956
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:956 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1776

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    MD5

    be13634e20a227787cac1290365ec07f

    SHA1

    28452f95942d6b118b739ff8000fec61a04c8e81

    SHA256

    00769bdc1c8b8384cf78841326d50756a37e014ace2d7c52053a380f23deb2c4

    SHA512

    9e7ee725177dca00d2fe868fc017e734578f09c15ce55a9c8cc7daab1d6890a79acdb103904e7d05d353350590224ae1180200f6f5fc423648aee01e4e2d1762

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\r32q9i9\imagestore.dat
    MD5

    c14c4a22470473162fc1a9ea3b03cf58

    SHA1

    2059ed8615b5976eb924f79c730f87d145aa65b6

    SHA256

    ba50ed1989430a40d0bf811e654b9f0bc1a1f57e42a8c64cf148ed58a2f81334

    SHA512

    951c2da264869123dfe7a6046804244d78b5f2db2d2939e2133bc97e9d4c9e5d50c9e2cc42d8b7c78289feb0a4a28c33ecb71a77837b1956a2e5efc1d92e99c8

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\SLVGT3PR.txt
    MD5

    471726fece321e6d918cce9d3d3e1eda

    SHA1

    e48200f66002dc1be28a40a48badf9c4efad4b24

    SHA256

    e53eea82afd6729f759bb495009c7d3402b9a0fc0e506dda225dbc8f80ab8f06

    SHA512

    276538b94ab813d3f064eea485a1c624bb0c3d06769d6c1c8f606af895c331bbe6028af337be429072e3a2816e8f45e876554658f893c0fd86dfc26c0384feed

  • memory/1776-55-0x0000000000000000-mapping.dmp