Analysis

  • max time kernel
    111s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    01-02-2023 10:58

General

  • Target

    https://security.microsoft.com/userSubmissionsReportMessage

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://security.microsoft.com/userSubmissionsReportMessage
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2020
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2020 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1552

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\K2Y3X4TU.txt
    Filesize

    608B

    MD5

    4ad0a058469b1171c3a0cb3f382db247

    SHA1

    6c221715dce3e51e1642423b9b8be166d0e7d7f5

    SHA256

    b575b193edc1d0d36800c500a6342817ff8cd2745c4880adf69819544d71db9b

    SHA512

    5f098ae60ba2c4959bb74ce3cef5171643326c6b9e633c7b09e10c44ed74c792062ffdd6784f24a7d60cef931a2dc570b49441d4600da055ca74e40217cd6879