Analysis

  • max time kernel
    173s
  • max time network
    202s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    08-05-2022 22:31

General

  • Target

    Onedrives/Onedrive1/LO.htm

  • Size

    1KB

  • MD5

    f52d41429c54062d947584633403fa42

  • SHA1

    fa4fd5f7815d47628be56578f9b93db79bf49243

  • SHA256

    3cd98d723283dd7d2fb0b73d8b142cb355cbcb1d5feab9a78d5fb0b60f859e1d

  • SHA512

    48ab92999f6522ef75f6d963b472d1124c5db9467a6fa7f1857034c5f8c68cad4137ab5dc33113fcff3893ef6513667992421844650e7c9b1149d6c173ece029

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 56 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\Onedrives\Onedrive1\LO.htm
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2040
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2040 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:4624

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads