Analysis

  • max time kernel
    148s
  • max time network
    203s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    15-06-2022 07:24

General

  • Target

    xlsx/xlsx/xl/link/Excel/PO/page.html

  • Size

    19KB

  • MD5

    a99eba08a837777ca726dbe6949b68db

  • SHA1

    3347e3043496786a8b912e3c321b2f6c33e5b4ea

  • SHA256

    be8578d26da2c5da354ac7f9701a235ad6a44f4bab1fb1722c394d0902a2027a

  • SHA512

    d45051d566720906a73aa0c4bde5f5e3f6c858b36a67757b5e1ff780de44c1ecaf6941cb996f60a0c82ba0ad8617184fc745fba3c52b6b6e24e4f8f21c85aab9

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\xlsx\xlsx\xl\link\Excel\PO\page.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1984
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1984 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1028

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\PGP27Q79.txt
    Filesize

    604B

    MD5

    36bac63c5eec22211b0f39dcf2547c5a

    SHA1

    0c09f2ec611db6f2ca458356cfd8cd7383ba473c

    SHA256

    aa968ebdcec7b32d1bb20625199063c2a0c3263350777eb04f304f0198c05731

    SHA512

    5cebe38ff8353b3526d6900de60a0128d6cf4d9f98ecd0e283c5084476771d90c955bcfba009fbbab1266319cb7421198fd0e5038207ed70a03185d647ec0692