Analysis

  • max time kernel
    167s
  • max time network
    200s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    08-05-2022 22:31

General

  • Target

    Onedrives/Onedrive1/YA.html

  • Size

    1KB

  • MD5

    d67910f919cab028ece0910045d35632

  • SHA1

    9d1bf565755997c23f78b61ec681ddb198bebe77

  • SHA256

    3740c585d2066e7137f393771fd52f905d46becd7c33a492201316a33bc53f09

  • SHA512

    816ea7debd32a5898cc6e423c83bc6c3e2fc91d7f562ef427e58bc7c425af3f44fb485e9eb2def03e65a6b6c7f6a9d98024339d742e7d876ca717b169813bae8

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\Onedrives\Onedrive1\YA.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1576
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1576 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1280

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\G701SFN9.txt
    Filesize

    600B

    MD5

    d46e08ecd58997ab38b5adec4eeecb0c

    SHA1

    2e29a59fc383fd492abad59d75085350a939f466

    SHA256

    23bd4ac06ca7b3d4bf3d479db13e40911293aae586bb90a8d0dcd09d98c05a5f

    SHA512

    494d1da0d4223634e48d5d0173ea2d2e72e915b08ab0ff6d72c96b4b2e3189d55874aebf529ebd7a63b204ab31c73109509a2b95c8d80d2cc238cb487b85d675