Analysis

  • max time kernel
    70s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    06/12/2022, 11:14

General

  • Target

    https://account.activedirectory.windowsazure.com/?tenantid=17ad707a-26cb-4f8b-93f7-68cc456d66ba&[email protected]

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://account.activedirectory.windowsazure.com/?tenantid=17ad707a-26cb-4f8b-93f7-68cc456d66ba&[email protected]
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:864
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:864 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2024

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

          Filesize

          61KB

          MD5

          fc4666cbca561e864e7fdf883a9e6661

          SHA1

          2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

          SHA256

          10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

          SHA512

          c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

          Filesize

          1KB

          MD5

          a266bb7dcc38a562631361bbf61dd11b

          SHA1

          3b1efd3a66ea28b16697394703a72ca340a05bd5

          SHA256

          df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

          SHA512

          0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          0ff2208d923aae4a42e58bcf232c097c

          SHA1

          f5b1551a50ebc1acbdb01d7c9c239e865eb069bf

          SHA256

          00beafe77cb3c24cc22d052c8747c46d7b5605ffd7a95a60e4cca339dfccd729

          SHA512

          42ab173f3b2929b90b3b31a2fbeb59a7b3da6ad8cb3728cdbbee2b17f7831e9627b4e4033a823b3034eef4e28caa23b8631855a2a7b9b2956cbc3cbd3adc2df2

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

          Filesize

          242B

          MD5

          53b94e09d0addee1f39a0bd373ed822c

          SHA1

          e8ac70c92eb856ca0baf765b1d6bc158a431ac0f

          SHA256

          ac0e8b673efac0f44484fb0655ca21b8588e913465476a66355891409e66fa73

          SHA512

          f31be97afd9456f45a259353f84aa55076138a43a36198a89859111864fc712c5946016585394d6a39f19ef4afb4e97dec358191e774326c4052491effb0a270

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\SBR71QA8.txt

          Filesize

          608B

          MD5

          eb98f35831dca1d44eaa5127c8e29b9d

          SHA1

          d141e3ccc3a34464507db712eb7cc6f181d7d50a

          SHA256

          aafff3c47306dd0142d8679110463cd81f7ba7a40f9fd3940f541b3e43678a36

          SHA512

          720d947e25ba9b32d8ae9b03df68f95521c2cdf61c0d10c9cedaf91c9e2c94c8d1a5046c9d293ea09e6802a4258a374640dba13b0548656417e2df9a1b6b4b38