Analysis

  • max time kernel
    91s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    19-05-2022 00:16

General

  • Target

    https://docs.google.com/forms/d/e/1FAIpQLSc9XOyFzd_I9d9vrNxejcAykMTKMxIpYvy-ACXTYaJ4TiRIPQ/viewform?usp=pp_url

Score
5/10

Malware Config

Signatures

  • Detected potential entity reuse from brand google.
  • Modifies Internet Explorer settings 1 TTPs 51 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://docs.google.com/forms/d/e/1FAIpQLSc9XOyFzd_I9d9vrNxejcAykMTKMxIpYvy-ACXTYaJ4TiRIPQ/viewform?usp=pp_url
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1840
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1840 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2084

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    Filesize

    471B

    MD5

    0139ae54ab5bd17af42facbbdf2b01d0

    SHA1

    aa0b305fad4211f81edfa2521bece92e758b4376

    SHA256

    93c8a57c9a7a70617fd4e7f17442b9fa24e31104000de22637123111dcb5c305

    SHA512

    f34ab12338eb3fd16bc26f24b20b349a14f6fa29f4dfdb91d026347222a66abc538e6753961fbc0484efeefc56abdf6edd00ec7a80b0b8a9270d747988e5741c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    Filesize

    404B

    MD5

    8ee6fb82485103f619b4c93d47963fd8

    SHA1

    acb7222a843818064f26ae61c70863d310605c11

    SHA256

    e667e46471c7c1193f21e18e4f02d273059bc8e54eac372683f2f748129c6cfa

    SHA512

    f342229079e59864d4a9072c03205d616bcf1cc36cd7e3b7534cdcd47142390072d4635e1ccfbe6cc0f2ce538d7ee3e7dc400d95d8ea9d0cdda3d5f5b893a713

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\1dmutkj\imagestore.dat
    Filesize

    5KB

    MD5

    fb4e889f805774727f137909dc76f7f2

    SHA1

    f1ce72d304ebbc22d2532c5da0369121fbd45fe7

    SHA256

    de0050a8fc47003c070c7ba6f06ec1b8826f95f2df60fcc6c0bbf21d408af706

    SHA512

    a8b1b7c442991eb769b7002c3f184aac2f95fb0ed9b1e341d9a1114672737893163c4a39e8705984625e1b22baebc42250fdbcd8860da20a686b8185fbe86a12