Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    03-06-2022 12:26

General

  • Target

    https://docs.google.com/drawings/d/1EtR4DNzX433nb3YdTC-Y-eiYvH0xwdIWvePZfkgj63A/preview#75743572521534768838850142637

Score
5/10

Malware Config

Signatures

  • Detected potential entity reuse from brand google.
  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://docs.google.com/drawings/d/1EtR4DNzX433nb3YdTC-Y-eiYvH0xwdIWvePZfkgj63A/preview#75743572521534768838850142637
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2300
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2300 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:3704

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    Filesize

    471B

    MD5

    40f3d6e279dcc348822e537f5e2cadf9

    SHA1

    bd55899191d13e6881757dc1db09c22d70429b6f

    SHA256

    339b289c94056014a26f6a661f27d892844e7f30bdf98d7d7b3e814d1aba401f

    SHA512

    f93476f6780fbfe97e85c690182259ec0e832dcd09fc6e2667bd159747ea8264ff2f25e0d254c7067fb4046daa548e56c74894850458e373651b4e1744b8f82a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    Filesize

    404B

    MD5

    fcb43f31d450d4ceb012f19c7485e4b6

    SHA1

    f1b31f9edc8d80a10aebaefb33732f2d1e089849

    SHA256

    df77c4546ab2142ae29e9c50444190f0728dc5724c4b0cc42b6fba328cfe77da

    SHA512

    89c78dad8492b9e440c9499619200468181cedbbde71277bf430db54c2c1db434f3fe2d4462889cfcc35a81829094143f447c3aa09d0f0cb041fc86640d13abf

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\2klo80q\imagestore.dat
    Filesize

    5KB

    MD5

    73f50f97d0f06acbb17ab106312cda63

    SHA1

    1fbedafaa389425da558bc519378221047ca987c

    SHA256

    2bc041f2af63fdd7d0fb5798661fae48ad62c4d911746d3a6908a043a2b9a73c

    SHA512

    c6caf31588aceff98388a1c8f43d63653c97dfc398788106cc5cafdf3737c1fd9bc4e3ffa6b79784248a42c1437424d768863c62feddc81206b2958f105a52da

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\AWDQ28Q6\favicon[1].ico
    Filesize

    5KB

    MD5

    f3418a443e7d841097c714d69ec4bcb8

    SHA1

    49263695f6b0cdd72f45cf1b775e660fdc36c606

    SHA256

    6da5620880159634213e197fafca1dde0272153be3e4590818533fab8d040770

    SHA512

    82d017c4b7ec8e0c46e8b75da0ca6a52fd8bce7fcf4e556cbdf16b49fc81be9953fe7e25a05f63ecd41c7272e8bb0a9fd9aedf0ac06cb6032330b096b3702563