Analysis

  • max time kernel
    134s
  • max time network
    136s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    27/09/2022, 09:50

General

  • Target

    https://urlshortener.teams.microsoft.com/8DA7521D67FFF4F-7-0

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://urlshortener.teams.microsoft.com/8DA7521D67FFF4F-7-0
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1960
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1960 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1212

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    60KB

    MD5

    6c6a24456559f305308cb1fb6c5486b3

    SHA1

    3273ac27d78572f16c3316732b9756ebc22cb6ed

    SHA256

    efc3c579bd619ceab040c4b8c1b821b2d82c64fddd9e80a00ec0d7f6577ed973

    SHA512

    587d4a9175a6aa82cd8bb1c11ca6508f95cd218f76ac322ddbd1bc7146a0e25f8937ee426a6fb0fb0bb045cedb24d8c8a9edfe9f654112f293d8701220f726b4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    5c6f806f832023778ae7257b72823517

    SHA1

    0882198d1e8eadcbcaa4c20b6154d4fbc4b984e1

    SHA256

    2c18a564e7851dfe6f30d8c1a5d4ee8b4e74837cd956411119c3e03b3cbdd4f9

    SHA512

    dc26ab1ecca479eb9e4d991c5c83fcb49d05c2c15c6ad2599cc6cdba22c632ed845cc4a19c99c563d2832183dfd890a39aa05f09e89092af694bb03280cd036d

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\4PF12YJC.txt

    Filesize

    608B

    MD5

    7fa6275d0319f2561efa828530451910

    SHA1

    93625060b14f4cfe0545d7a41827a6a79b9245af

    SHA256

    86dc63d623606de1510e60592e5415f4ebfe03224a9cf4d86b905fae445df625

    SHA512

    fdc4fb7db7ee4cd56e1566e8aa91330278d19991735d2cdd8478193b7bca38a7289c4a3d01e9c0630a8799fe1727bb7e95af0ff7a8a12a52b3ef2451a2cc5daf