Analysis

  • max time kernel
    67s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    25-01-2023 10:02

General

  • Target

    https://woffu.my.salesforce.com/servlet/servlet.ImageServer?oid=00D1r000000drJu&esid=0189N000000hGCQ&from=ext

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://woffu.my.salesforce.com/servlet/servlet.ImageServer?oid=00D1r000000drJu&esid=0189N000000hGCQ&from=ext
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1400
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1400 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1960

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    340B

    MD5

    63df8329fc803ddc7e789e557dee8a98

    SHA1

    becf2f294e832ebc05d70a3152e74f5a8111105c

    SHA256

    bbddcae12a2b0c57dbde9d9287d98b193e791e5b3bdcdf8aae7fc6a819195829

    SHA512

    f8c6be266152d04ecd2d604e3c26231b90feb01d55697ad3df7f57556ff26c0e80fa04cf628a9c73245b36035913552ba724fe05abe1054f242a5c175e8928e3

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\lwrmjt1\imagestore.dat
    Filesize

    9KB

    MD5

    4c96fe8f55cf73411b6c9a36d3781606

    SHA1

    8683c20f926c9909cc5eca5ce70e5a88ff345378

    SHA256

    e6eb83a6524f29d880d2bd20765c9e29156606183fcd43a050de140827add1cb

    SHA512

    825277846cbf94b87a3dd10b380e81740642df02e6af9c13c3dc1cf27e2e726e7b74c26cc3df17b0998931a17e6171bd9b59ade5852499defa94dba6e642476f

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\RWAOC5DK.txt
    Filesize

    608B

    MD5

    00b328dc64927914f5c64da4cbbd6b41

    SHA1

    491920f20c21e4615ae2635b582a6cc3b5eaea85

    SHA256

    6de729f349dd9841b4ca5384bd037f9500d06a287763fbfb6158a72745c37e94

    SHA512

    ad570f537dc705be852deceb5bd9fd204bcd04389fbc9b177e437e42307ef533642f31851ce0b39e8749696a537a43cc8eda671c856d8b58890bba1717095a5e