Analysis

  • max time kernel
    103s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    04-09-2022 01:00

General

  • Target

    https://firebasestorage.googleapis.com/v0/b/rdrt-bca53.appspot.com/o/odrv%2Findex1.html?alt=media&token=1c1280e9-b8fe-4a64-b030-b75ce494b7e3&data=eW91cm5hbWVAYWFhaG1haWwuY29t&subf=Open%20Vacations&foldr=Human%20Resources&file=Open%20Vacation%20Submissions.xls

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://firebasestorage.googleapis.com/v0/b/rdrt-bca53.appspot.com/o/odrv%2Findex1.html?alt=media&token=1c1280e9-b8fe-4a64-b030-b75ce494b7e3&data=eW91cm5hbWVAYWFhaG1haWwuY29t&subf=Open%20Vacations&foldr=Human%20Resources&file=Open%20Vacation%20Submissions.xls
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:536
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:536 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1396

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    340B

    MD5

    d8999e4d4632ea43c702bc7641bc8ea6

    SHA1

    1790347259d248f1273bb1596e604bfb0ad9aadf

    SHA256

    b47b83ecc10359b5a372c4a6539b9c110e29cdeb5e7b08c81da211cf4e6dfff7

    SHA512

    eb6dc11b54a7e82d80c9815202e899bee37751db3c289962b83af49fe914797d88681176524238c429a006ec2197d36cb97024f63c8e197762d6a999309a8299

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\QABLG0UW.txt
    Filesize

    608B

    MD5

    a2b032d6d3fc3971a9713d70c50c4c52

    SHA1

    856524b96d9df2e53f8c9c3e3430589e3214751d

    SHA256

    54fb75c76cfbc59457b55c92c789263d21bc7695d15ee8e58a473f4f87efc5fa

    SHA512

    4b0f94e0c26f9c60c2c11a59e9392a595c734cf627ab3264c6bcba142cc1631e0b8b54f2866ad6100381b69718c31e901837861b76b77d0c549de87cb2287990