Analysis

  • max time kernel
    77s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-01-2023 10:02

General

  • Target

    https://woffu.my.salesforce.com/servlet/servlet.ImageServer?oid=00D1r000000drJu&esid=0189N000000hGCQ&from=ext

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 57 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://woffu.my.salesforce.com/servlet/servlet.ImageServer?oid=00D1r000000drJu&esid=0189N000000hGCQ&from=ext
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2912
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2912 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1892

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    Filesize

    471B

    MD5

    b011d2725e33c0bae4cc6110f1228caa

    SHA1

    98595cb1500ab32b457063d29a60a8ae5496b49b

    SHA256

    cfb146a5a70caac0842df76ab5cffbb524b9964c4a4250473189d053f24ea9ae

    SHA512

    60e98f54414f8e14185dd66570b6f4e1cee6471648b700391e59042249e9546d9baa19a6dd0c0b6b8ea17e1eb4059303b7a584507624d0634a50d957af21bfc0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    Filesize

    404B

    MD5

    e447dbc5e794c5b2fa0219b02d971ada

    SHA1

    cc7d7dd897bc629a569270ffecb81fec74d7d142

    SHA256

    e3b8b56f095014b655c36776e2044cdf3ce44fdead199b782d5b323ff3355c6b

    SHA512

    b1b2e83a186bc49309dd2df2cc98c895e1484bb38b8c548bd62f99f881a341994936f7ef4d3a0cf398f345a7f958892c3c45e5bcf2c285b304b8daff7464596b

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\3mhxqpl\imagestore.dat
    Filesize

    5KB

    MD5

    8828c6d10534ed42d350483e3325af53

    SHA1

    aa1d89dcfd48f89f052492cd4eb04356cedb3194

    SHA256

    e639f115721806fe044b66290724fd5f293a73964d0682d5edd078c6bbd8b9bb

    SHA512

    0076ac75758bc3309fcb8ea5e5a3b6c4797d8a7ffec227d2f204643f6ff674bfa60807b4c8e826d41bc7ef112569c73fb1b1f46c6943ace61478428b247e0ada