Analysis

  • max time kernel
    125s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    19-05-2022 00:16

General

  • Target

    https://docs.google.com/forms/d/e/1FAIpQLSc9XOyFzd_I9d9vrNxejcAykMTKMxIpYvy-ACXTYaJ4TiRIPQ/viewform?usp=pp_url

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 47 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://docs.google.com/forms/d/e/1FAIpQLSc9XOyFzd_I9d9vrNxejcAykMTKMxIpYvy-ACXTYaJ4TiRIPQ/viewform?usp=pp_url
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1640
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1640 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1808

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    5c5eaca452cb96712b8008e0f1fd071f

    SHA1

    df7957bff47051ff8f4c218454eafd31d8e03681

    SHA256

    b4b199b0e44c91c5eb5f6c1d3134a3c65c056581677df59a6fabf09b478ec91b

    SHA512

    504613b07956ec278f56dcd5a489ee96666812d6ccd593d1f5020315d18c4ddf39c614e13397cd0ff18715a3cd9b94dac6d6ca7337b8c0b9f0d841bddd2db60a

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\1b4wh1e\imagestore.dat
    Filesize

    9KB

    MD5

    84f22496d0d9ff21bdffe60c4f23c83b

    SHA1

    d118f9ac0bea6dba741cbd9070dd2cf7ff728451

    SHA256

    32d972cb9195bc9c5b316bddc70db54ad3447e78be7110b1b25bb4e8f7994881

    SHA512

    b04dc43bfd9cefcb4d8f15bb7aaa6dfdb5d1e57358ff7695da067d8ab38990168306fc6d49e49fd57164de9fdc4542054640ce860a0aea3b8f91d3990ae27a3a

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\7M10KLY0.txt
    Filesize

    607B

    MD5

    66b1577a9ec0adcc8733c1e5cda7b7b3

    SHA1

    2e0401b72e2de04b38fec92dc0e3c2947f32201b

    SHA256

    66dcbf15f88f729b6dcaac1888f3178b6dfc66849673938b2aaf43084957de67

    SHA512

    445c011e7ccd262c61975f2285c303f6fdc4ab2a2036432a649a1f755fce47f45c5beba0344f5a4f421d21c28f9b5375999bd99e509f7cad6f7687c38059be91