Analysis

  • max time kernel
    125s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20220718-en
  • resource tags

    arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system
  • submitted
    04-08-2022 01:23

General

  • Target

    https://content.mileskimball.com/?FFjsyR1SJ95xn9f21v9fMuqSokdbEKsUF&http://waXHSfu.8ECbFsR.postmail.co.za/?=andrew.weil@smith-nephew.com

Malware Config

Signatures

  • Detected microsoft outlook phishing page
  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://content.mileskimball.com/?FFjsyR1SJ95xn9f21v9fMuqSokdbEKsUF&http://waXHSfu.8ECbFsR.postmail.co.za/?=andrew.weil@smith-nephew.com
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1264
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1264 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1704

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    340B

    MD5

    8a5dcb7849f5b797e5c5f5ea8ee621eb

    SHA1

    3abefa570e0002089b0b791e0420c34bad0babe9

    SHA256

    9e8e3c67159e1208064c270d512c601a92303184ea5afb0b618c013dd56abd8a

    SHA512

    2aa0fb314d2a9a6ab189706688d38c6ba93e2b5a0cebb0fab3dd3106fc61c42ac833eacdc838983a328787484f014aadfccc602b6c2c3a133ca25aeed3663976

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\H2VTLSVD.txt
    Filesize

    593B

    MD5

    666dc60a838c94922fbb2dcc049b4fee

    SHA1

    d858b70f80a1378840240855ef8f467036c970ba

    SHA256

    57027f6584609511b4567b2f9d88f184afa68c880eb3f924b0949559310db65c

    SHA512

    7d3a1eaef18e113cac2144be2f607e65c11601f37c0c98db573b70cd52c58fcdde8be426f1f6de482a823c88a40722d990e461d495f90d54a0be30b1b1478f53