Analysis

  • max time kernel
    68s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    31-05-2022 17:56

General

  • Target

    https://docs.google.com/document/d/0BzpRHgBmkelPeS0yUE5EMkpHem1idGdMS3JWU0pZcHlrcjJr/edit?usp=drivesdk&ouid=115018010936808814464&resourcekey=0--YCSzwT619v3YncOOzPbAA&rtpof=true&sd=true

Score
5/10

Malware Config

Signatures

  • Detected potential entity reuse from brand google.
  • Modifies Internet Explorer settings 1 TTPs 51 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://docs.google.com/document/d/0BzpRHgBmkelPeS0yUE5EMkpHem1idGdMS3JWU0pZcHlrcjJr/edit?usp=drivesdk&ouid=115018010936808814464&resourcekey=0--YCSzwT619v3YncOOzPbAA&rtpof=true&sd=true
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4644
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4644 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:3896

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    Filesize

    471B

    MD5

    5c0c2169ab43deb967d1f3a88e654579

    SHA1

    e8dbc5cb9da5f4ba115b0bf6a97169824c3181ee

    SHA256

    3e75204662a1c0b57e2db397d8164018ed47a5d451e73c40590f192adb9d0cb1

    SHA512

    de4350ccf4dc05617586bcf5f4006fae29663d48c931ce051bffa9c9a7b7b185ea85940933ef8b876132c3f3500681c26164e43dbfdea2277d4491dba37c683b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    Filesize

    404B

    MD5

    5325107bfd983b8f091f1500d808a551

    SHA1

    7843291b3c69df883da2f9f99c42ecb7ef0135e4

    SHA256

    3678c2d170ccca91c4b99c5ab7fea889b5d98cb39eb31705aaa4afb19b6310a9

    SHA512

    8d07c0afebcb409f5156508b7d0ce2cc680c3331defb51b86e229eb6e3cebab19a16028da0c69d4de79212db8d55bccba63ab2ac107f1d06b257c53eb5ac0afd

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\jnqp20o\imagestore.dat
    Filesize

    5KB

    MD5

    096caf81b33ad91ef32174b11ab66f4a

    SHA1

    90c218cc1e4d03794cf8a0374a7c24ede144cb28

    SHA256

    b5756020dc64d4bf3b1ee02d95a44a45193727cb78186313e62634385fe056f4

    SHA512

    02a886fbc7b8e7623064aff4c2384462beb2e598b22a841c528d3629e8a83c36f658aad56e31c8685add1fd564e8cf0859c086e9ba826fd321fc89ea6ec491e7