Analysis

  • max time kernel
    167s
  • max time network
    212s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    08-05-2022 22:31

General

  • Target

    Onedrives/Onedrive1/LO.htm

  • Size

    1KB

  • MD5

    f52d41429c54062d947584633403fa42

  • SHA1

    fa4fd5f7815d47628be56578f9b93db79bf49243

  • SHA256

    3cd98d723283dd7d2fb0b73d8b142cb355cbcb1d5feab9a78d5fb0b60f859e1d

  • SHA512

    48ab92999f6522ef75f6d963b472d1124c5db9467a6fa7f1857034c5f8c68cad4137ab5dc33113fcff3893ef6513667992421844650e7c9b1149d6c173ece029

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\Onedrives\Onedrive1\LO.htm
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2020
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2020 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1784

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\G1U8PAMG.txt
    Filesize

    603B

    MD5

    98f7baf5cbf02ef8efd1cdd3ec754f40

    SHA1

    ae8fb26692036450d6331c7a2f6f05d7c014626d

    SHA256

    062019f7d34f1eb60c823e21112481fed0b716d296eb83806c5a1dbd76d4b2ab

    SHA512

    f7d6e6076c52bca39e74903076a8b45930e062811d7b7b2c294e0ff5d3c0cbbf87e29cfbd17f21c9ae3c00dd4e67ef39206a115f925872b17eadbf06b74eb9c5