Analysis

  • max time kernel
    122s
  • max time network
    137s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    15-06-2022 07:24

General

  • Target

    xlsx/xlsx/xl/link/Excel/PO/page.html

  • Size

    19KB

  • MD5

    a99eba08a837777ca726dbe6949b68db

  • SHA1

    3347e3043496786a8b912e3c321b2f6c33e5b4ea

  • SHA256

    be8578d26da2c5da354ac7f9701a235ad6a44f4bab1fb1722c394d0902a2027a

  • SHA512

    d45051d566720906a73aa0c4bde5f5e3f6c858b36a67757b5e1ff780de44c1ecaf6941cb996f60a0c82ba0ad8617184fc745fba3c52b6b6e24e4f8f21c85aab9

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 41 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\xlsx\xlsx\xl\link\Excel\PO\page.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4556
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4556 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:4260

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    Filesize

    471B

    MD5

    253626de057b0d04c41cb8a08245fcbe

    SHA1

    ffcb46236625dc17807021f8fe706efda9970958

    SHA256

    75b3965bbb50f8e182b84896c7496cc36b3710b95bf607734a2dae8c40588989

    SHA512

    6bab75dea365fe30bc00ac7d53db9d9876929ad2f7576d9090fdd5a3950f2e98b46edd573f3c5c8ab2ccaaab9c4c2e36cc515fa6419b7931a4a9e8b2b44e3113

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    Filesize

    404B

    MD5

    fb98302f753049624d73c909b609adbf

    SHA1

    52d88dacf84d42c6e2ea827133fc41f60969c0c1

    SHA256

    a2028b12ca01092987787e17500590b0fa97be5084525ea28d83855cc5731d15

    SHA512

    42a71414a24d65fd03b9246b9105a14007a97708f8f9c9f28a9027ca7eabccdbe14425f9437e75a7983411154a1a17b8284506064c59821c8fa50f595d4ca2db