Analysis

  • max time kernel
    262s
  • max time network
    358s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    01-12-2022 16:03

General

  • Target

    https://outlook.office365.com/owa/?path=/group/CCTSFY23@dir.texas.gov/calendar

Malware Config

Signatures

  • Detected microsoft outlook phishing page
  • Detected potential entity reuse from brand microsoft.
  • Modifies Internet Explorer settings 1 TTPs 32 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://outlook.office365.com/owa/?path=/group/CCTSFY23@dir.texas.gov/calendar
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:828
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:828 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1936

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    26a11da25c396476bf216c94bd9e87f1

    SHA1

    c3b40095576a8f2e842e7aa3966630319094ad8d

    SHA256

    145db137d983c20f147df9514e863b90c3b7f9a83581503d62c89349821de27a

    SHA512

    94ce96134cf417e020fdfe296e1dc72a6a79e0146da97ddcee68186c448d46409f626de0cbd62ceafb1f0314f97e3b54da7ee7500dfcda17fa4eb79937facb53

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\mlf2v8h\imagestore.dat
    Filesize

    18KB

    MD5

    2645c62b63a279e4a3e9278b18bd8725

    SHA1

    91482475c529a7d16d647d7ffb515cf41bfee656

    SHA256

    8daf8fb0f7b697145585899e59d06d1312087ce520b0af44ce16f6038a9df986

    SHA512

    e49ac3cd9cf2a0b1de0effb9c92eaca4520b492c0b834e6fe8e4ca24e4c7f9d223acde83162de3bca6521574abf1ec5f897f3bce8a6456d325fccedcc13bbbc3

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\LNF0X54A.txt
    Filesize

    533B

    MD5

    8f610f24e43c2431b5563ae94454ac2b

    SHA1

    ca02403e739a91fec5027a5ed37a9f287d38e4d7

    SHA256

    d74b112543521eba6582e59b2ede9fed39244ac95c2be63d32d889319bb5df23

    SHA512

    5277c05afbbcab716d88f076ef524a55e5df30ebb902efcdc894b8e4c6a8e8089f3dab9ee5c5c978fe15e5d819b0db9b0c2d2c41768dea556608d9c59647d333