Analysis

  • max time kernel
    74s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    02-06-2022 20:56

General

  • Target

    https://docs.google.com/document/d/10iFiZsdfETE5opjY2352ncmU8fisls96iujnY37PIPM/edit?usp=sharing_eil_m&ts=61dc3c3a

Score
5/10

Malware Config

Signatures

  • Detected potential entity reuse from brand google.
  • Modifies Internet Explorer settings 1 TTPs 51 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://docs.google.com/document/d/10iFiZsdfETE5opjY2352ncmU8fisls96iujnY37PIPM/edit?usp=sharing_eil_m&ts=61dc3c3a
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4476
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4476 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2760

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    Filesize

    471B

    MD5

    201cbddbce3a9c4b74c705638c1d3b65

    SHA1

    1da7bbbb9b7c70bf1896118129251a05f1675602

    SHA256

    66ecd30ff9746637900ce0f39c6ff1d302d82441b6786dffe92afdfdb42c9492

    SHA512

    f5a361eaa9301e7dd8ab7814339ab49e9727e5520f1614e05bcb246d9df3a44fca8171bfbcfd4e2d7afc60bdf7b86b5f885d15181eeec40d3ab5c18ea86a7a6c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    Filesize

    404B

    MD5

    350417ff7ed4df092d165816edef431b

    SHA1

    de59c100c5fdc26122ceb9c02e5f03f58ae39153

    SHA256

    0d387e5138d3b374a633fa76af75712d34dc5d02064c68ca363999d614ad436c

    SHA512

    ef7cd020ab44d5f1374892f6c8e538e97a20dc6958a9eb67d888a9836ad49dd461ebc0d589895c8494a7c458f128094a9da1a571a195e58c4b8eec202cc29b87

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\jnqp20o\imagestore.dat
    Filesize

    5KB

    MD5

    9d21c05c0e27d7199705c623c2b40cc0

    SHA1

    162c0d1074281f7a388500a1a4d8ea22045b527f

    SHA256

    8691294923ec8563ba9decf02dd46025aa5174ff30de085dab01c0efc255a394

    SHA512

    f3ce66ec411cfdf6487f7c02c11575d00815b30fd38900053c5aaac0f9b1a9d49c0eeed012e29fbe41c07ec61467a4ea8ad0398e2d5f74fa78de070dfa8c778a

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\JMSH2W2H\favicon[1].ico
    Filesize

    5KB

    MD5

    f3418a443e7d841097c714d69ec4bcb8

    SHA1

    49263695f6b0cdd72f45cf1b775e660fdc36c606

    SHA256

    6da5620880159634213e197fafca1dde0272153be3e4590818533fab8d040770

    SHA512

    82d017c4b7ec8e0c46e8b75da0ca6a52fd8bce7fcf4e556cbdf16b49fc81be9953fe7e25a05f63ecd41c7272e8bb0a9fd9aedf0ac06cb6032330b096b3702563