Analysis

  • max time kernel
    72s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    21-06-2022 07:16

General

  • Target

    https://bit.ly/3JpFXp4

Score
5/10

Malware Config

Signatures

  • Detected potential entity reuse from brand google.
  • Modifies Internet Explorer settings 1 TTPs 51 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://bit.ly/3JpFXp4
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4552
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4552 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:448

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    Filesize

    471B

    MD5

    da3ee152a5c31850a1d3b179e494e578

    SHA1

    05b49d337fa6f227f91bfd37674579219a15b80f

    SHA256

    a9bb0e8aa256d407651238239817c62fe52bbd75abdcbbff147765d0eae344b5

    SHA512

    b49def7e58211a1d121badb50464ffe57d1617a60019ed6a2b2c87376b0b276da3c063ecec37f1dfee7147cd7dd748ba8ed7ff5b9de7cdd9673e735d30ef1833

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    Filesize

    434B

    MD5

    94e3ccc42c8cc37d02fa00fb7100b80a

    SHA1

    83ee9e558afa49db5cb8083c2b5707b0b875ac7c

    SHA256

    2d13ed493395907bd763c104e240b3f260c90c40ad74f89e79ad761e3a17192f

    SHA512

    46e8e346fdb34b2dbed67a866558f89d6339cfef3b09fa5d08ab73fa2e689f6442e3908443df5d09ed9bbcaf3583097e8912dda8dc5e71be9d73717dd14d1709

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\a5473fd\imagestore.dat
    Filesize

    5KB

    MD5

    021a5b7e5d1a6b5894e7fabede36cd57

    SHA1

    a78fff7a372dab3dfe2da9dab0b34512bc65918e

    SHA256

    53e727911cff5595f7975ebd475c2c7d799f9b1dcf3f0650000ae254d0bcbf89

    SHA512

    325a8fbb90b04b06754b6909d59cae9c219861e8667f6c858a500e3fa7ae79d64daac7e9d3e62c886627f5bdb548872f540ecb6b72f85e3b5a253919f10f6d91