Analysis

  • max time kernel
    122s
  • max time network
    132s
  • platform
    windows10_x64
  • resource
    win10-en-20210920
  • submitted
    03-11-2021 15:49

General

  • Target

    https://drive.google.com/drive/folders/1y7F7RzcB-ntxyxL3k7_V1lzPDQzQUkCA?usp=sharing

Score
6/10

Malware Config

Signatures

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Detected potential entity reuse from brand google.
  • Modifies Internet Explorer settings 1 TTPs 50 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://drive.google.com/drive/folders/1y7F7RzcB-ntxyxL3k7_V1lzPDQzQUkCA?usp=sharing
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4064
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4064 CREDAT:82945 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:4504

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Command and Control

Web Service

1
T1102

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
    MD5

    6d707758dd2e7edf14d9621938e451ab

    SHA1

    e9c015074b63d4189ae2c4f212bb15e5a92dbf79

    SHA256

    945fc990738d49edfcc5e2be6c59ba6ce2fa1b483832f137d8ef897300f5f890

    SHA512

    1d486c4f781d495e4f903ae7789d40c81115d40d4efd593a88e3e831dd5a60a8117cee16cc80b05f7fd32fb937fcc94fb5936944c48c790e6bfa591e8a25bef2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\A16C6C16D94F76E0808C087DFC657D99_5411BDEEACC3999569FAE2A91A33551C
    MD5

    bb7d74d10b385321af85e341ca974f6e

    SHA1

    66b38b3436c34cd889cbed2d7ff14c617b07889d

    SHA256

    33dc3aadcf8bf1a8686c28c81b99005dc42f29a3612f27fca5864ab562f9a17b

    SHA512

    fa7e584986a7f216b07afb8fdb6a2a32636f7eb2fe74bacca62f8c1ceb82bdaba414a5b317e92a8de8a6ddb367f805e71162a7604683710ad0dda5c5b70fb7c9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
    MD5

    64e9b8bb98e2303717538ce259bec57d

    SHA1

    2b07bf8e0d831da42760c54feff484635009c172

    SHA256

    76bd459ec8e467efc3e3fb94cb21b9c77a2aa73c9d4c0f3faf823677be756331

    SHA512

    8980af4a87a009f1ae165182d1edd4ccbd12b40a5890de5dbaea4dbf3aeb86edffd58b088b1e35e12d6b1197cc0db658a9392283583b3cb24a516ebc1f736c56

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
    MD5

    1860488590f9538cd710f12b074e07c7

    SHA1

    380c107b432e4b6898ddf70bb6487d17ad72c5b5

    SHA256

    21da6952065cc99f5e158894ab9073da0686307bbe24a1b9bd8279cc5bfe05bc

    SHA512

    472dd79cc4235025e90197b501b09b36c6d8864a12aa21d0bfdd7d1ca1a7b9bcb05be330ed6fbb2da5e8f5865b91fbfc98056c38042b65a94f9dcbe9ed86e3a0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\A16C6C16D94F76E0808C087DFC657D99_5411BDEEACC3999569FAE2A91A33551C
    MD5

    e0f80c0932795249c8febe6a3248753b

    SHA1

    57d1d8945c4175a0b0d8342d78da00eb71685bb0

    SHA256

    142b8900053909bc015533b75b0afc8800b08aef97b56ca3ce270bc4e5baa3e4

    SHA512

    9746e081189e50c3293577980e3ecff4c3d9cce2990bce4b5ad20ffda63ea7620e1158cedf03b8e66bc97484b8de89d726e5ed4b728fa0172a824a8fe3dcbb87

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
    MD5

    9b7a733cd6db1141c146eae16698df97

    SHA1

    d40eb7c759a6542a4721bea502aa108b05a17da9

    SHA256

    ddbe06260fcab65695351af4082d1a5a81eba66b4f417fb732a1db688e010479

    SHA512

    f9739a1d4f8897fbbb20620ac1c614889a422f349bdfeba2066a4a4da4ca41f58a270ee9e6298681a32b922b927bf4827c2aa58a0dce332de6dede517bad2239

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\5NPE940S.cookie
    MD5

    24b26357e32ea20cf9609fe841fe68e0

    SHA1

    30220c93fca103dcd12b2aa25f88d7b21591c6e9

    SHA256

    2f02c47ecaf5433e2ff696f115e74345996a49f787dbe841aa5051c8bd4252d1

    SHA512

    e9724e958c4296884773b58b829854abeeb80556d962ee9d372e22b2d6662e8c26693730578f4d9ee7c72fdbe4efc0fdd16f9ddf52c8ec6e6af73d7e1f9bdc6c

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\QTOYNZ3F.cookie
    MD5

    804a37097389482864c38580cba8d0b7

    SHA1

    6db297c1280b154a4620b1768216aacda814eb24

    SHA256

    784f21dbbc0a8f0ad917c0c7bd3131224a20f7b1f94a14e5b49863eaf2037852

    SHA512

    a9074a0e728f36ad3f921196c79241fc3b35a98d8f437821f7c44e0e6ff588a5e12552b3fb6b789ac7f186c3abaf54f9f5be21c6b364c924138535f8c890b7e5

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\WYEUZYI7.cookie
    MD5

    0ef4c6ea5bebde1248d4317138851b0e

    SHA1

    312b9dbfece8d06efa3936edfa952b65cc5737ac

    SHA256

    67f08d29bf7afa9da482557d83386e7b2146c2ac5defa29ac61ddc4cce05fc33

    SHA512

    72a826e30c1538f8cdc49f17680537a87256d61095081abf223553c08bd2b4da63b0af99b4f1f8e1d87b70ca48d3211f115b6fdb8acf6a37af81b065e3decfbc

  • memory/4064-149-0x00007FFC08500000-0x00007FFC0856B000-memory.dmp
    Filesize

    428KB

  • memory/4064-171-0x00007FFC08500000-0x00007FFC0856B000-memory.dmp
    Filesize

    428KB

  • memory/4064-128-0x00007FFC08500000-0x00007FFC0856B000-memory.dmp
    Filesize

    428KB

  • memory/4064-129-0x00007FFC08500000-0x00007FFC0856B000-memory.dmp
    Filesize

    428KB

  • memory/4064-131-0x00007FFC08500000-0x00007FFC0856B000-memory.dmp
    Filesize

    428KB

  • memory/4064-132-0x00007FFC08500000-0x00007FFC0856B000-memory.dmp
    Filesize

    428KB

  • memory/4064-133-0x00007FFC08500000-0x00007FFC0856B000-memory.dmp
    Filesize

    428KB

  • memory/4064-135-0x00007FFC08500000-0x00007FFC0856B000-memory.dmp
    Filesize

    428KB

  • memory/4064-136-0x00007FFC08500000-0x00007FFC0856B000-memory.dmp
    Filesize

    428KB

  • memory/4064-137-0x00007FFC08500000-0x00007FFC0856B000-memory.dmp
    Filesize

    428KB

  • memory/4064-138-0x00007FFC08500000-0x00007FFC0856B000-memory.dmp
    Filesize

    428KB

  • memory/4064-116-0x00007FFC08500000-0x00007FFC0856B000-memory.dmp
    Filesize

    428KB

  • memory/4064-141-0x00007FFC08500000-0x00007FFC0856B000-memory.dmp
    Filesize

    428KB

  • memory/4064-142-0x00007FFC08500000-0x00007FFC0856B000-memory.dmp
    Filesize

    428KB

  • memory/4064-144-0x00007FFC08500000-0x00007FFC0856B000-memory.dmp
    Filesize

    428KB

  • memory/4064-145-0x00007FFC08500000-0x00007FFC0856B000-memory.dmp
    Filesize

    428KB

  • memory/4064-147-0x00007FFC08500000-0x00007FFC0856B000-memory.dmp
    Filesize

    428KB

  • memory/4064-115-0x00007FFC08500000-0x00007FFC0856B000-memory.dmp
    Filesize

    428KB

  • memory/4064-150-0x00007FFC08500000-0x00007FFC0856B000-memory.dmp
    Filesize

    428KB

  • memory/4064-151-0x00007FFC08500000-0x00007FFC0856B000-memory.dmp
    Filesize

    428KB

  • memory/4064-155-0x00007FFC08500000-0x00007FFC0856B000-memory.dmp
    Filesize

    428KB

  • memory/4064-156-0x00007FFC08500000-0x00007FFC0856B000-memory.dmp
    Filesize

    428KB

  • memory/4064-157-0x00007FFC08500000-0x00007FFC0856B000-memory.dmp
    Filesize

    428KB

  • memory/4064-163-0x00007FFC08500000-0x00007FFC0856B000-memory.dmp
    Filesize

    428KB

  • memory/4064-164-0x00007FFC08500000-0x00007FFC0856B000-memory.dmp
    Filesize

    428KB

  • memory/4064-165-0x00007FFC08500000-0x00007FFC0856B000-memory.dmp
    Filesize

    428KB

  • memory/4064-166-0x00007FFC08500000-0x00007FFC0856B000-memory.dmp
    Filesize

    428KB

  • memory/4064-167-0x00007FFC08500000-0x00007FFC0856B000-memory.dmp
    Filesize

    428KB

  • memory/4064-168-0x00007FFC08500000-0x00007FFC0856B000-memory.dmp
    Filesize

    428KB

  • memory/4064-169-0x00007FFC08500000-0x00007FFC0856B000-memory.dmp
    Filesize

    428KB

  • memory/4064-125-0x00007FFC08500000-0x00007FFC0856B000-memory.dmp
    Filesize

    428KB

  • memory/4064-127-0x00007FFC08500000-0x00007FFC0856B000-memory.dmp
    Filesize

    428KB

  • memory/4064-172-0x00007FFC08500000-0x00007FFC0856B000-memory.dmp
    Filesize

    428KB

  • memory/4064-174-0x00007FFC08500000-0x00007FFC0856B000-memory.dmp
    Filesize

    428KB

  • memory/4064-179-0x00007FFC08500000-0x00007FFC0856B000-memory.dmp
    Filesize

    428KB

  • memory/4064-180-0x00007FFC08500000-0x00007FFC0856B000-memory.dmp
    Filesize

    428KB

  • memory/4064-124-0x00007FFC08500000-0x00007FFC0856B000-memory.dmp
    Filesize

    428KB

  • memory/4064-123-0x00007FFC08500000-0x00007FFC0856B000-memory.dmp
    Filesize

    428KB

  • memory/4064-122-0x00007FFC08500000-0x00007FFC0856B000-memory.dmp
    Filesize

    428KB

  • memory/4064-121-0x00007FFC08500000-0x00007FFC0856B000-memory.dmp
    Filesize

    428KB

  • memory/4064-120-0x00007FFC08500000-0x00007FFC0856B000-memory.dmp
    Filesize

    428KB

  • memory/4064-119-0x00007FFC08500000-0x00007FFC0856B000-memory.dmp
    Filesize

    428KB

  • memory/4064-117-0x00007FFC08500000-0x00007FFC0856B000-memory.dmp
    Filesize

    428KB

  • memory/4504-140-0x0000000000000000-mapping.dmp