Analysis

  • max time kernel
    299s
  • max time network
    284s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    23-05-2022 17:29

General

  • Target

    http://fms.vru.ac.th/admin/admin_1590415904/file/command/MIND/bid/login.php?

Malware Config

Signatures

  • Detected microsoft outlook phishing page
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http://fms.vru.ac.th/admin/admin_1590415904/file/command/MIND/bid/login.php?
    1⤵
    • Modifies Internet Explorer Phishing Filter
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1108
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1108 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1964
    • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\CSMPMU9R\Employee Evaluation Form.doc"
      2⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1512
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        3⤵
          PID:1908

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Modify Registry

    2
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357
      Filesize

      1KB

      MD5

      a266bb7dcc38a562631361bbf61dd11b

      SHA1

      3b1efd3a66ea28b16697394703a72ca340a05bd5

      SHA256

      df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

      SHA512

      0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      df8cdaf2d873addc11b2cd6598d8e0f8

      SHA1

      ac8440c9ed7ce4672b2d968ac6487190b5141117

      SHA256

      488884c723f726dbae96d8122f51c4c2de410061749c24af2c5cb0ce5aaa67e7

      SHA512

      e4d55b2f81a0802168ac5f5965913e5571979c88e79399dcc103a590958ec94eeaefa9988e78853e92d577ee5f765bb24521511c91b5a54b58b797d35464371e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
      Filesize

      242B

      MD5

      341e609fbb94a4f37af1be4e12fb0030

      SHA1

      57e6c729d347e5691b36ad4ed7d7f68903e4c4bc

      SHA256

      5314c1ce63e140e101003edf0519b49bbf419967631e871377ccfd0d22706a29

      SHA512

      db0fb18ede656272d284d6d701063ae2d9f9624cb9f9b704b5f42243d26ae0b32add6a0229161a1bb95f42f19e4a2934321f6fb7d246c7106d8e945032b14a67

    • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\1b4wh1e\imagestore.dat
      Filesize

      12KB

      MD5

      57850e8082bf0f42421ec086ca59c00b

      SHA1

      2a42c1ea28235bcaa8be6c9a5d4cb9a5db63e8fc

      SHA256

      7e4d2be6c99feb4c9ea43db56f1e34daf21ad79b55bd5e4a20cd85a77afe7839

      SHA512

      e7b018ae45edefe051d2a178c086fa0d23e6dde0e3a6d54ea2378c8293aad68a630aa92f1ddc55c8efd6f8391c0e0bce0e806c7bb89fa417d146bd6014f07df7

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\CSMPMU9R\Employee Evaluation Form.doc.bhdds96.partial
      Filesize

      97KB

      MD5

      83e68f528c33b75c33556ede30f06fa6

      SHA1

      aa4d343ef18855784a43e9687c093eb87952fe85

      SHA256

      9a47f841430a1b774ff2a93fe5ffd7f778a91ef508903d082c9295c4a5f2b2f7

      SHA512

      7be9404e4c7797ab4bbc8749c180e8c12e603fdfb40de95ff9aada9e584acfeeaf60b5cf93c3870d65e4cc68eb0ea589bfd0f174f5f45740181b99ba82ab7cd7

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\BT6XYMY1.txt
      Filesize

      608B

      MD5

      06516b678b787bd62bf6ff341acedb58

      SHA1

      34a5a438766f8118dff98125b2616e6608599857

      SHA256

      e81e0e3dd87cfa8a4c82e7a6817ee7408df35b9430e1131b57c1797c1f6ca26f

      SHA512

      741849973f887b3ef58e0f0da1d54e36acfaf46f1400ade1845232114c9d63343957eba4fd749fb875ad9c0391462fcc5bdb1d9a4f6c88d041790e7d9a7c5eb8

    • memory/1512-60-0x0000000000000000-mapping.dmp
    • memory/1512-61-0x0000000070161000-0x0000000070164000-memory.dmp
      Filesize

      12KB

    • memory/1512-62-0x000000006DA11000-0x000000006DA13000-memory.dmp
      Filesize

      8KB

    • memory/1512-63-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/1512-64-0x00000000755B1000-0x00000000755B3000-memory.dmp
      Filesize

      8KB

    • memory/1512-65-0x000000006E9FD000-0x000000006EA08000-memory.dmp
      Filesize

      44KB

    • memory/1908-66-0x0000000000000000-mapping.dmp
    • memory/1908-67-0x000007FEFBB71000-0x000007FEFBB73000-memory.dmp
      Filesize

      8KB