Analysis

  • max time kernel
    68s
  • max time network
    131s
  • platform
    windows10-1703_x64
  • resource
    win10-20220901-en
  • resource tags

    arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system
  • submitted
    02-12-2022 18:11

General

  • Target

    https://login.microsoftonline.com/af73baa8-f594-4eb2-a39d-93e96cad61fc/oauth2/authorize?client_id=48001eab-ba41-4083-ba08-d923c91b17b5&redirect_uri=https%3A%2F%2Fmyasml-staging.unily.com%2F&response_type=code%20id_token&scope=openid%20profile%20email&state=OpenIdConnect.AuthenticationProperties%3DPURhS8pKLLlJLqkBeiIhO9xBQOXErSiW_AGvWMnd-FAILBmVVxRZcxDT2z-74lqghCdZwOYr-gjsWGmWbHSAHujKb91JQiQB1_SXqboX2PA_EwsLPtxDMFxXfBCXcqxzSklRcT_T6NY7nJZ5gomES3s-3lZkc9lGnTqt9EYecI2Aj4GFjFNGBjnvd5sp_Ss75DV3oPxZG6-gGr0zz2rs0y5l1nGCXuA1oFhcOxCAI7V2XfL6X1PJgYDt2VfzkYBFFC9Ir7vbYjBA7Mfqqh-6WQ&response_mode=form_post&nonce=638055971673188089.NTVmZjJjYjItY2Q2YS00N2QwLTgzMzctNDM3Mzk5NzU3MWY1MWQ2NzAyN2EtNmQyYS00NGMzLWI5MWQtMDIyYTkzODU4YjNj&x-client-SKU=ID_NET461&x-client-ver=5.6.0.0

Score
5/10

Malware Config

Signatures

  • Detected potential entity reuse from brand microsoft.
  • Modifies Internet Explorer settings 1 TTPs 49 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://login.microsoftonline.com/af73baa8-f594-4eb2-a39d-93e96cad61fc/oauth2/authorize?client_id=48001eab-ba41-4083-ba08-d923c91b17b5&redirect_uri=https%3A%2F%2Fmyasml-staging.unily.com%2F&response_type=code%20id_token&scope=openid%20profile%20email&state=OpenIdConnect.AuthenticationProperties%3DPURhS8pKLLlJLqkBeiIhO9xBQOXErSiW_AGvWMnd-FAILBmVVxRZcxDT2z-74lqghCdZwOYr-gjsWGmWbHSAHujKb91JQiQB1_SXqboX2PA_EwsLPtxDMFxXfBCXcqxzSklRcT_T6NY7nJZ5gomES3s-3lZkc9lGnTqt9EYecI2Aj4GFjFNGBjnvd5sp_Ss75DV3oPxZG6-gGr0zz2rs0y5l1nGCXuA1oFhcOxCAI7V2XfL6X1PJgYDt2VfzkYBFFC9Ir7vbYjBA7Mfqqh-6WQ&response_mode=form_post&nonce=638055971673188089.NTVmZjJjYjItY2Q2YS00N2QwLTgzMzctNDM3Mzk5NzU3MWY1MWQ2NzAyN2EtNmQyYS00NGMzLWI5MWQtMDIyYTkzODU4YjNj&x-client-SKU=ID_NET461&x-client-ver=5.6.0.0
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3512
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3512 CREDAT:82945 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:4940

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    Filesize

    471B

    MD5

    4132c54f59c529167c112e7f519120fa

    SHA1

    94cc9036fa031258aa744c7ee88e3c0b6c7a73da

    SHA256

    e9f456cf8bb8cc4a683d1c2f792feeb4c83fff24a86e6bcb260eff8fbff126fb

    SHA512

    e8efb8e81a90ffbe177301fbba4470ded104fc6d12cfa0123938b981d612eb2c4a66bb47b585cd43ed6ed4940e0ad5a1e3a5d9d18f8cb643e741aae694c4baee

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\80237EE4964FC9C409AAF55BF996A292_E503B048B745DFA14B81FCFC68D6DECE
    Filesize

    471B

    MD5

    0ceb959707bc4a9a9a94e3881584aab0

    SHA1

    80f8154bab75b5c54a116dcd25e2d8b20e187ce0

    SHA256

    34e300ba0c264a6dc331be37fa3874a0f793b86dfcb6fb7ad4b184cd246318cb

    SHA512

    26b482b5e4a489f080ebff21f6f267cf01938549ea8f413786f58b5fc5cb66f79fcca3c5e5ee89c6e49b34fd752b66f8f3c3ac790ecd7c8bbe2d608694248458

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    Filesize

    434B

    MD5

    0cf6b6430460434a4a26b7f9600142e7

    SHA1

    5db2b6afa26c8ec45a238897ead536dc5aab26ff

    SHA256

    6e3721827fa82e5a586528dab1abb8c5374ebf69ed0d8bfac70c6163ac508e7c

    SHA512

    dfa671dd9b4a0de0660cd3672cded8e2a396de9c90cd0c99e685ed894e1c1ef57547c4b8858d64dcae20722fd1cf1b49aaaaf4be19f76eaa9afd1f3982656180

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\80237EE4964FC9C409AAF55BF996A292_E503B048B745DFA14B81FCFC68D6DECE
    Filesize

    416B

    MD5

    c5e6bf07469ab056e1bf73bbd01c4025

    SHA1

    beebde390549434e53b79f25375bfafacc572f3a

    SHA256

    eb02b68dd890f83f31958acab9e55839594fc0f48d690e4bc2fea1d5cdbab2cc

    SHA512

    96a60ddddfdf120ef0864eebad5b25ea55bf4c3758498a29742445d78327029490b3dd76a933b96cdb0cb7cee8359001b06985f7d6a5719de1ba8f63d2e3f050

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\YW9J2CL1.cookie
    Filesize

    615B

    MD5

    5e1a76a4554e629748c93ce7acd1e237

    SHA1

    6e9b270d8ad28c7047722ca1370334a6a2901f4a

    SHA256

    59ea71b5cc312b35b100412c1f5298ffd5fcf924761088de89d98c8e2d865e84

    SHA512

    88a66adaa210f7624e5e818a84df918f421f06d2e84ce0b85d2d1e95a59c146167719d619453d7d4c13b89a8fe84a5eba177fb77d66ac89f05cea8219fe98f13

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\Z4W4VRHW.cookie
    Filesize

    615B

    MD5

    d605f2554ca465c5a42d27214dad4ece

    SHA1

    fc0c17055565dd945a38f33979ada010011fb1ec

    SHA256

    7b1986eb0c5f9ebe497da1f9d263bf42aa567f492d5a0f98423e58d547d2aeeb

    SHA512

    48251f4466a90ff641db375b0673746bd90b80fbf48794539ab0c92bb3c6d3163ae5e6ceab79ff621f108f379aff0252cf483379690f1390f092bac73c0af0aa