Analysis

  • max time kernel
    108s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    09-05-2022 08:43

General

  • Target

    https://docs.google.com/drawings/d/1KCDsmvxhhmSNpsb6NewQDiYO1sbxELomDF-5BeMbHcA/preview?0zzrL

Score
5/10

Malware Config

Signatures

  • Detected potential entity reuse from brand google.
  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://docs.google.com/drawings/d/1KCDsmvxhhmSNpsb6NewQDiYO1sbxELomDF-5BeMbHcA/preview?0zzrL
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1868
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1868 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:736
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k appmodel -p -s camsvc
    1⤵
      PID:392

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Modify Registry

    1
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
      Filesize

      471B

      MD5

      e3ceb62a9896465e13c3b72f5b790d33

      SHA1

      48430ff0579a232e2036dc918ef0172c527d50f9

      SHA256

      3bbbbcdbe16f6d569d1e3a712d1902d46b2b7b667e9b034cdcdd80eaa5d48001

      SHA512

      b90f3edae41ef2fa395225ad76985d5465ca28a77353b381fbc2c4b2a8fc82cbb1632b9fe9b69294b63efd91de6a4498bda7b53bf5c7b922d7dd30447759af72

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
      Filesize

      434B

      MD5

      efa6e9a905a78c9279af247ecd22d9a8

      SHA1

      eec6c454e4d86d626f64b303ce6925c028ef8b75

      SHA256

      f79f6ca40c12de26edb732dedb91052f29ebebb693cd4531f52baae0b9d75a60

      SHA512

      eaae618c59da42142794b82142251a157987b8a0a5e2598a7309b7deb3df5ac51928bb9827e635559925c37a1bf34a41b623d2bd5d0cd0e8b45246dc5bbe764e

    • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\2klo80q\imagestore.dat
      Filesize

      5KB

      MD5

      0311d26ca3d3369e5f0de63368b9c48a

      SHA1

      5eb79b2fb3bc6109577706c4e9e58b5aea22b1d3

      SHA256

      88d6c1ef22ca579ffb5e25983698d0c2fc477db39e1b60ef8a14dc362400d5a8

      SHA512

      be2d512253952cfca79790f0bc3434dda91448fbb99cee805986a726905df4adfa9aed78e5da64e14670987810c422f69b89d01cbd2ff8aaeb804def8d7eaf77

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\T4LT4978\favicon[1].ico
      Filesize

      5KB

      MD5

      f3418a443e7d841097c714d69ec4bcb8

      SHA1

      49263695f6b0cdd72f45cf1b775e660fdc36c606

      SHA256

      6da5620880159634213e197fafca1dde0272153be3e4590818533fab8d040770

      SHA512

      82d017c4b7ec8e0c46e8b75da0ca6a52fd8bce7fcf4e556cbdf16b49fc81be9953fe7e25a05f63ecd41c7272e8bb0a9fd9aedf0ac06cb6032330b096b3702563