Analysis

  • max time kernel
    73s
  • max time network
    129s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-11-2022 07:52

General

  • Target

    http://www.microsoft365.com

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 48 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http://www.microsoft365.com
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2440
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2440 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:3024

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_1DC6D7385EA816C957BA2B715AC5C442

    Filesize

    1KB

    MD5

    7dbbe5c72a2c70161bf59bfb84159ab4

    SHA1

    98b5b99f672b437dace04df3614f651a4546d7b7

    SHA256

    b051017933b6f9a17b2ec0ee2e05b9c0661bf7814dea37e7e936616e5113cfb8

    SHA512

    c552d529ce86a968249047f761ddcba8b01337ac4e1d1ba4a7302440bf57a1e1621f4057fed96da07c18de765408f30e807949007e14a486bc22fec5f7434d23

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    6df395096ecd4495391458b01010ecb2

    SHA1

    2f1dc39b55265fd6219172e40362c1240506470a

    SHA256

    6439a7a722864b1920d0307e0fb2eb95207b22010005086b5856646a51f2a7e0

    SHA512

    eb333fbf74de85ca8bb66dc1c286f71d744e929e614bd056b73fa5161f26e89ef5028d4f729f02de3438ef519bc74968cb0c25428a880efe523121182bb65803

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_1DC6D7385EA816C957BA2B715AC5C442

    Filesize

    446B

    MD5

    65dfde54b486fdec9bf5b8639ace23d9

    SHA1

    5c544a3c10b75e5aceca9308506781ddbaa490ae

    SHA256

    39aa75a79c87d76eaacd83e38be61aba259cf124bd60f41ebd57b0ca148c3851

    SHA512

    0fcf2184e55f94ac3051c0bace56189426f022f491435cce99ad11876978ad97d5533d78ea34f9d79fc6204398da85ca1f1c7f341c532ab8e0dfa0cca69fd92c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    404B

    MD5

    36d24c9a1f0e46cd43aaec7f586360c9

    SHA1

    fa4d497fac858587c7ef72778a90545f3dfea787

    SHA256

    51465f907d8d2eb2dd4faf1704575b3cd5be555004efcc25d248bbd6dfbb54a1

    SHA512

    4d943d86d822e24817838ef0bc1c6b54020a7bbf1dbdb497350bd138150de5be826c6e8e372890ca6b5a9aad35aca96172091e55d7fb603eff13c44e7e05444a

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\z2evvp3\imagestore.dat

    Filesize

    8KB

    MD5

    f9f4ec71b08044553dfb1cac1d15fd1b

    SHA1

    ab4a79fea971e88b4985d907d954874ceee622db

    SHA256

    f5cbb739b00bc60da4b27f5b0ab803fcbc4a32f3d8476a0777224782a188c447

    SHA512

    77f4a20f16a2930554bb9e051950f5da545af6109012cdc08ff36a3dbc6913ede1e443c01b2224a80c098ce1d37e9e781436f6892ffa6c3986dcb112af1da6f4