Analysis

  • max time kernel
    148s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220721-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-08-2022 07:35

General

  • Target

    https://vships-my.sharepoint.com/:u:/p/poobalan_harikrishnan/EWgMDr7KaSlInuQDxlaN35UBUNgn-3Y2hKRf3Ju8RE0FLQ?e=yfnJfN

Score
5/10

Malware Config

Signatures

  • Detected potential entity reuse from brand microsoft.
  • Modifies Internet Explorer settings 1 TTPs 29 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://vships-my.sharepoint.com/:u:/p/poobalan_harikrishnan/EWgMDr7KaSlInuQDxlaN35UBUNgn-3Y2hKRf3Ju8RE0FLQ?e=yfnJfN
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3372
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3372 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1340

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\kt9o6s3\imagestore.dat
    Filesize

    16KB

    MD5

    b4abe7118687940758f3873a800cfed8

    SHA1

    762afbbc6a92193e8bb4deb96cc8a3e7a825c4d0

    SHA256

    5dd9921f53dd13b18305608fd70619c6aca5cf93f0d28da97d62c9270fb24dea

    SHA512

    392f6b29d359365468dc51a510398763307f4518d946c7e033661007d99a2eb28e60f691b11e41dbb816ffa1bd60cb20ff19461388fc29de149307beb185ca47