Analysis

  • max time kernel
    120s
  • max time network
    132s
  • platform
    windows10_x64
  • resource
    win10-en-20210920
  • submitted
    04-11-2021 12:27

General

  • Target

    https://forms.gle/8pLPXPxLgFBBCWz7A

Score
5/10

Malware Config

Signatures

  • Detected potential entity reuse from brand google.
  • Modifies Internet Explorer settings 1 TTPs 50 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://forms.gle/8pLPXPxLgFBBCWz7A
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3104
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3104 CREDAT:82945 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1168

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
    MD5

    2a276649c48c9798edf3c34e5ca4ac98

    SHA1

    673fb27211b89efc4ec796017a3787c887a5163c

    SHA256

    27c29537046db2b23b228ddebc1368e6df2a43dbfac8f90f90e094f8376a2dce

    SHA512

    516e00636025b2be73125275c2fed0d74b520b56fe4ae1a3d3fac3e035f7382428f17457c7aa3252342219fedf0b1f741da5a0d98376f8c1bcd4e55a7f84dd0d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\A16C6C16D94F76E0808C087DFC657D99_5411BDEEACC3999569FAE2A91A33551C
    MD5

    cfe01e13f2beee80979868556cd03b5d

    SHA1

    b9ad0d7e46a9e457b0d827c9a76dabde260f0b53

    SHA256

    e325b253f2423fc79f0f6a92aef0c573f9f76a9b733cfdca6828f9b15ce3b125

    SHA512

    af74857499926e0dbf430f9e4e9ece03a61e67bb5b37fdfb4b3cfffecd689aae60fa862541a64d0d928701a1a2ae46cdaa49bca7080626827c2c328bcafd93c0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
    MD5

    64e9b8bb98e2303717538ce259bec57d

    SHA1

    2b07bf8e0d831da42760c54feff484635009c172

    SHA256

    76bd459ec8e467efc3e3fb94cb21b9c77a2aa73c9d4c0f3faf823677be756331

    SHA512

    8980af4a87a009f1ae165182d1edd4ccbd12b40a5890de5dbaea4dbf3aeb86edffd58b088b1e35e12d6b1197cc0db658a9392283583b3cb24a516ebc1f736c56

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
    MD5

    3772e42e90599d2d38d91716e08cbadd

    SHA1

    993dcfd4897b2459cbb3c4cab336da9339f0e4e0

    SHA256

    ad315216a5cf6daa968bcde4c7bc1334542aa92d65c57f3316b3c4f0ccdb726a

    SHA512

    fbfdd23b5605a5c1774dd84da95b3f243d79ec7203d0e0fd4a19ebe23c0f6307e63eb1e481143e27c911d81952356946df696e7438f5c3d2e6d88b3ef0b08213

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\A16C6C16D94F76E0808C087DFC657D99_5411BDEEACC3999569FAE2A91A33551C
    MD5

    c53168b1ae12e1f3188a0e317d36848a

    SHA1

    aaf7997f6e9dec2eedda7403be3e40375e47526f

    SHA256

    d494561bdc24dae30b9bffb7328a2a55d125df00ad47abc45c492401dbd10e0c

    SHA512

    b7e7f72a017de933a2ccc968bdefa9b9c5646f6b666bcb4ea28710ea3464e4ba11068331f9555361b232a483ea29b65e56945f71e33726de1ea0f9e591d16d2e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
    MD5

    9c612aa8adbc12d2776fc3423c1df934

    SHA1

    e7e7999e1e3301b02d783d8ad882e47572d27607

    SHA256

    2c5e9fb6151175640d6cc81d56ac2830a73a1441fefa526ee18b09e257e16758

    SHA512

    7a5ecb733b44e1ca90e5551f2032df7b6bd43b71fddf284c204f8d6fbdfb13cf6cb347964f2912ee861186beca6feb19643d2914a310724afbc8fb3647839464

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\D3SGE3ET.cookie
    MD5

    cccf0a568cc996b8d9e78f40464c0d99

    SHA1

    ddeec0c4d2712e4014b9258418699a56f981d988

    SHA256

    51ec3b0de4a5ca3d43b6cfa429c4cecd2730acbd342d67e85886a3ea420cd4f3

    SHA512

    44dcf3784b763b4999a3f95ea2291095edd9297f0103ce584625566d4b153e49d1adb5022bc19e4e55740a755d0a5256dfa4ca70af02281ab2b8873103ac58ab

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\I2SLMG7D.cookie
    MD5

    5c0b3175d375c87dffc9e97e017d7121

    SHA1

    492d3232a9c0fd98560c0d4a2e67121c155c3f03

    SHA256

    61be7d3013cec29269595d510cc537fcf10008df9784bf3a7de5138ae8d524d2

    SHA512

    db2e468a754bb340ba3f44adedd8146fbd210b08f8e7017936df564f93c4b9f0efd154a5aeaaac0bf87376d5ce62f3388c13b8617f980cec880123e93c921763

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\U7AL69K4.cookie
    MD5

    e295582eb35f9c607d9cbc57e86d069d

    SHA1

    c5f73d045353b359a441392acef67b9ff30f1096

    SHA256

    e4b94ca726ce2ae63c2a0f25a5584091631a6f58f1ffe0b5582e451f95add505

    SHA512

    6d3819ea1e2f67c0b078cf3248270ccf67676595d3b3d51a01ac767b7960afdac4596ed65309154140d36c8810b2ea222233b1d6152d7a78164dcde890170865

  • memory/1168-140-0x0000000000000000-mapping.dmp
  • memory/3104-149-0x00007FFFA03D0000-0x00007FFFA043B000-memory.dmp
    Filesize

    428KB

  • memory/3104-157-0x00007FFFA03D0000-0x00007FFFA043B000-memory.dmp
    Filesize

    428KB

  • memory/3104-128-0x00007FFFA03D0000-0x00007FFFA043B000-memory.dmp
    Filesize

    428KB

  • memory/3104-131-0x00007FFFA03D0000-0x00007FFFA043B000-memory.dmp
    Filesize

    428KB

  • memory/3104-132-0x00007FFFA03D0000-0x00007FFFA043B000-memory.dmp
    Filesize

    428KB

  • memory/3104-133-0x00007FFFA03D0000-0x00007FFFA043B000-memory.dmp
    Filesize

    428KB

  • memory/3104-135-0x00007FFFA03D0000-0x00007FFFA043B000-memory.dmp
    Filesize

    428KB

  • memory/3104-136-0x00007FFFA03D0000-0x00007FFFA043B000-memory.dmp
    Filesize

    428KB

  • memory/3104-137-0x00007FFFA03D0000-0x00007FFFA043B000-memory.dmp
    Filesize

    428KB

  • memory/3104-138-0x00007FFFA03D0000-0x00007FFFA043B000-memory.dmp
    Filesize

    428KB

  • memory/3104-127-0x00007FFFA03D0000-0x00007FFFA043B000-memory.dmp
    Filesize

    428KB

  • memory/3104-141-0x00007FFFA03D0000-0x00007FFFA043B000-memory.dmp
    Filesize

    428KB

  • memory/3104-142-0x00007FFFA03D0000-0x00007FFFA043B000-memory.dmp
    Filesize

    428KB

  • memory/3104-144-0x00007FFFA03D0000-0x00007FFFA043B000-memory.dmp
    Filesize

    428KB

  • memory/3104-145-0x00007FFFA03D0000-0x00007FFFA043B000-memory.dmp
    Filesize

    428KB

  • memory/3104-147-0x00007FFFA03D0000-0x00007FFFA043B000-memory.dmp
    Filesize

    428KB

  • memory/3104-115-0x00007FFFA03D0000-0x00007FFFA043B000-memory.dmp
    Filesize

    428KB

  • memory/3104-150-0x00007FFFA03D0000-0x00007FFFA043B000-memory.dmp
    Filesize

    428KB

  • memory/3104-151-0x00007FFFA03D0000-0x00007FFFA043B000-memory.dmp
    Filesize

    428KB

  • memory/3104-155-0x00007FFFA03D0000-0x00007FFFA043B000-memory.dmp
    Filesize

    428KB

  • memory/3104-156-0x00007FFFA03D0000-0x00007FFFA043B000-memory.dmp
    Filesize

    428KB

  • memory/3104-129-0x00007FFFA03D0000-0x00007FFFA043B000-memory.dmp
    Filesize

    428KB

  • memory/3104-163-0x00007FFFA03D0000-0x00007FFFA043B000-memory.dmp
    Filesize

    428KB

  • memory/3104-164-0x00007FFFA03D0000-0x00007FFFA043B000-memory.dmp
    Filesize

    428KB

  • memory/3104-165-0x00007FFFA03D0000-0x00007FFFA043B000-memory.dmp
    Filesize

    428KB

  • memory/3104-166-0x00007FFFA03D0000-0x00007FFFA043B000-memory.dmp
    Filesize

    428KB

  • memory/3104-167-0x00007FFFA03D0000-0x00007FFFA043B000-memory.dmp
    Filesize

    428KB

  • memory/3104-168-0x00007FFFA03D0000-0x00007FFFA043B000-memory.dmp
    Filesize

    428KB

  • memory/3104-169-0x00007FFFA03D0000-0x00007FFFA043B000-memory.dmp
    Filesize

    428KB

  • memory/3104-171-0x00007FFFA03D0000-0x00007FFFA043B000-memory.dmp
    Filesize

    428KB

  • memory/3104-125-0x00007FFFA03D0000-0x00007FFFA043B000-memory.dmp
    Filesize

    428KB

  • memory/3104-175-0x00007FFFA03D0000-0x00007FFFA043B000-memory.dmp
    Filesize

    428KB

  • memory/3104-176-0x00007FFFA03D0000-0x00007FFFA043B000-memory.dmp
    Filesize

    428KB

  • memory/3104-179-0x00007FFFA03D0000-0x00007FFFA043B000-memory.dmp
    Filesize

    428KB

  • memory/3104-180-0x00007FFFA03D0000-0x00007FFFA043B000-memory.dmp
    Filesize

    428KB

  • memory/3104-124-0x00007FFFA03D0000-0x00007FFFA043B000-memory.dmp
    Filesize

    428KB

  • memory/3104-123-0x00007FFFA03D0000-0x00007FFFA043B000-memory.dmp
    Filesize

    428KB

  • memory/3104-122-0x00007FFFA03D0000-0x00007FFFA043B000-memory.dmp
    Filesize

    428KB

  • memory/3104-121-0x00007FFFA03D0000-0x00007FFFA043B000-memory.dmp
    Filesize

    428KB

  • memory/3104-120-0x00007FFFA03D0000-0x00007FFFA043B000-memory.dmp
    Filesize

    428KB

  • memory/3104-119-0x00007FFFA03D0000-0x00007FFFA043B000-memory.dmp
    Filesize

    428KB

  • memory/3104-117-0x00007FFFA03D0000-0x00007FFFA043B000-memory.dmp
    Filesize

    428KB

  • memory/3104-116-0x00007FFFA03D0000-0x00007FFFA043B000-memory.dmp
    Filesize

    428KB