Resubmissions

07-04-2022 18:00

220407-wlpd8sfhhl 6

07-04-2022 17:30

220407-v264jsfhfn 6

Analysis

  • max time kernel
    256s
  • max time network
    251s
  • platform
    windows7_x64
  • resource
    win7-20220331-en
  • submitted
    07-04-2022 17:30

General

  • Target

    https://drive.google.com/uc?export=microsoftonedrive=d&id=1wBI_XOY3mYs9X0xbUYpjue12ANnlZWV4

Score
6/10

Malware Config

Signatures

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Modifies Internet Explorer settings 1 TTPs 41 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 11 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://drive.google.com/uc?export=microsoftonedrive=d&id=1wBI_XOY3mYs9X0xbUYpjue12ANnlZWV4
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1076
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1076 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:1768

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    b07136aa3240fbccaec1ba1ce4d4aba0

    SHA1

    1701c86c9b672f5a9bfb4c0e75e166d449cd05dd

    SHA256

    fec9d30036bbfacddb05f82f4b8971aeb744ab35a343e8be438c04e16aa8ab66

    SHA512

    059d657777bab9fd151ad3ab39c5f12a328914fccb27302d4743beff19db224e2ab691c953344b033edc56aa59153d8c16b6bd9876e3e354bd9436c569bb2692

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\b1rou5u\imagestore.dat
    Filesize

    5KB

    MD5

    b22f3d277afba69d356b1218dfb27055

    SHA1

    69eb9d0afde1bb2b11aff4bb9376bbf4869db7e1

    SHA256

    dfa1e3bd538b3aa5e94ed0192dbef6fb001677aa90e64c53d4404ed4e18407a6

    SHA512

    26b9e83367d4e0db6ad605a1e9a7848f53571508803ba3fe49a20217d394c8f7a5cd1fb9ef59bacae5c33d400721769289aea29d4c75cf4a5c2e8101ed583fab

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\RN33WQKB.txt
    Filesize

    603B

    MD5

    b89de34ef48aa21caf71c0b7fc65de8c

    SHA1

    235071d050e7a1db62d6ea2658ef8c00ec070387

    SHA256

    d032d63ead0413ffd795b1deee3637617685ff083448f13236018f582b091d26

    SHA512

    7adc963e6abf3ddbd277b0bddd49c488712567609993c413139e81ce90bd0cf22e7673a9e4fa47602cb385ef2e32ceec355ce277d6c881987dd92c880c0abe63