Analysis

  • max time kernel
    169s
  • max time network
    199s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    08-05-2022 22:31

General

  • Target

    Onedrives/Onedrive1/OFE.htm

  • Size

    1KB

  • MD5

    6911992ff4ff9a120ef3a5b47665bc43

  • SHA1

    00529af6376d7909e3cca30b83310e932c746301

  • SHA256

    71626f486da8284aa5873c98bf92fe33aa567d77a1c2e2976a57e39648605221

  • SHA512

    7d1e3fa1cf285e03dfb4ab03f3084f5afdb66d663aeb20d8fe29e90c125f6925723bf0bbf5a91e0c18e207c4a36070c0b6e423c78c57a91fa3fb806350d78d10

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\Onedrives\Onedrive1\OFE.htm
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2000
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2000 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1328

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\VGPIEH9O.txt
    Filesize

    601B

    MD5

    1437cff0036daad922222b159131bc35

    SHA1

    3ce1116bb7cdfa813b98fbaea975ac019d00895a

    SHA256

    cde5b77580a9dd295bc4759f487ac51dfa2eb23cb439ec079eda6dcc3d29f0e2

    SHA512

    eeaf4b56707197f30cc81493ee2da9ce4991fd57d25a1dc9aaa83fbee31e36f5236901611def433948ace8f833464868373e4d56d81254543d31c4e806c559a1