Analysis

  • max time kernel
    79s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-02-2023 14:59

General

  • Target

    https://outlook.office365.com/owa/?viewmodel=ReadMessageItem&InternetMessageID=%3cYT2PR01MB8535BE895DE5625F3A043B33F2DA9%40YT2PR01MB8535.CANPRD01.PROD.OUTLOOK.COM%3e

Malware Config

Signatures

  • Detected microsoft outlook phishing page
  • Detected potential entity reuse from brand microsoft.
  • Modifies Internet Explorer settings 1 TTPs 41 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://outlook.office365.com/owa/?viewmodel=ReadMessageItem&InternetMessageID=%3cYT2PR01MB8535BE895DE5625F3A043B33F2DA9%40YT2PR01MB8535.CANPRD01.PROD.OUTLOOK.COM%3e
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4188
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4188 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:4644

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    Filesize

    471B

    MD5

    bd813f25b25946e19e7b3acf153b3674

    SHA1

    1570516b96c7931bd565ac9102e79e1664216997

    SHA256

    6c744ffa4555b4c92c632743742782df3e1b9c33004c73247574da26a759ea2c

    SHA512

    145c738a3702f08d8d307188a4422e3842bc08aced2190f74601d8398d2001cb722e3c32bb6988e35a44a456fb042e6ae833a121da092d21dc2a04683932b47b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    Filesize

    404B

    MD5

    9c350ce3d5dba684a3bf443595b52f72

    SHA1

    13a5adf03534d8ee0b73aaac09efa15838e15031

    SHA256

    08fec56f0d97bb2c81752b9cb685351767c5d52be995ee6e09c5f9c69a75ecde

    SHA512

    3747fa6a966f2f48a1ef27e58d84b06656225c3ad7ca2952e10d74086fad5f2c5ddd93c0865780605d4cc1f1d9197ec85b79db5fb42317a9dcbb44abdac4e6d8

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\xyoggsx\imagestore.dat
    Filesize

    14KB

    MD5

    5d36bd8846047b9e5df61adbce9cb2d3

    SHA1

    35ab029390a3ca2798dc3ed9125991a68441caa6

    SHA256

    6bdf6b717a94440d20fa63572ceb3af0673f6898224a26954640f55bfaf87d42

    SHA512

    e434033f30cba42c8e11f899563a3e88020191d7b0e212a0644d873cadf71cacd4875c437fa56eaf2ddea5e3f922345cec82977ed4932049d0b6a1169660a97c