Analysis

  • max time kernel
    134s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    25-01-2023 10:52

General

  • Target

    https://multichannellogistics-my.sharepoint.com:443/:o:/g/personal/wayne_multichannellogistics_co_uk/EjAsJBZTcGlMpbnSlWgMvZoB0Stlv-xQ2K88_cwOMscvJg?e=5%3acqyvYy&at=9

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings ⋅ 1 TTPs 38 IoCs
  • Suspicious use of FindShellTrayWindow ⋅ 1 IoCs
  • Suspicious use of SetWindowsHookEx ⋅ 6 IoCs
  • Suspicious use of WriteProcessMemory ⋅ 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://multichannellogistics-my.sharepoint.com:443/:o:/g/personal/wayne_multichannellogistics_co_uk/EjAsJBZTcGlMpbnSlWgMvZoB0Stlv-xQ2K88_cwOMscvJg?e=5%3acqyvYy&at=9
    Modifies Internet Explorer settings
    Suspicious use of FindShellTrayWindow
    Suspicious use of SetWindowsHookEx
    Suspicious use of WriteProcessMemory
    PID:1648
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1648 CREDAT:275457 /prefetch:2
      Modifies Internet Explorer settings
      Suspicious use of SetWindowsHookEx
      PID:1680

Network

MITRE ATT&CK Matrix

Collection

    Command and Control

      Credential Access

        Defense Evasion

        Discovery

          Execution

            Exfiltration

              Impact

                Initial Access

                  Lateral Movement

                    Persistence

                      Privilege Escalation

                        Replay Monitor

                        00:00 00:00

                        Downloads

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                          MD5

                          66bcac1d54848902293d4adef850643c

                          SHA1

                          749a4f6fd5f6f3c00e3420b126f30e8ac2d24f2d

                          SHA256

                          83a7932378a262d54d5683ca5d25a88005952938edd4f733a9c4a72aec72d51d

                          SHA512

                          0a1ac3263f66d464661321181d65c37cd72fa8e41aad762ab9aa6011c4fed0a4ac8d695eac96e9c21e512bf14492004833fc36abbce25d3ada724246188db0da

                        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\t9o3c8r\imagestore.dat
                          MD5

                          24ec986d8342542a560e8c0315bcb090

                          SHA1

                          71d19aa52f9cf9934fe2149fbb88a503b3333b76

                          SHA256

                          3b98b43a1efbbe8e44318889341e70677144218bfc4bb6e5f5fa1339ee5b5db7

                          SHA512

                          d5694ddeae8d9e55d5472a0408e23b85806c0acf7059737a1a5b9887e5a5d4d773e48fafd960a73d2cee0539169542808737f724e4d1358309b5488eecb23701

                        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\J03QVSAL.txt
                          MD5

                          491a1205b96075579736d6bc7df4e576

                          SHA1

                          b76dc2acd72f9fff5baa4acd3d31e5b2cd0f92f5

                          SHA256

                          dc76aa4cc965f23438d32ed25a821d56199bd101211856ba7dc0c7e506ca643f

                          SHA512

                          4e61937533562f4b48af0ff986e402fc1408303ccd5636e1740486e66c2dbb738bcdaa343febfca1d05e79307a7c9eabdf0c5ca2983c031b0b15ff253310cc9e