Analysis

  • max time kernel
    140s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    23-06-2022 20:50

General

  • Target

    https://drive.google.com/file/d/1dJUWEzDtUjApuaWdCK6gqKpN3DWVU02l/view?usp=sharing_eip_m&ts=62b4cfe4&sh=kaQkhHxzrDFFYdci&ca=1

Score
10/10

Malware Config

Signatures

  • Detected google phishing page
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://drive.google.com/file/d/1dJUWEzDtUjApuaWdCK6gqKpN3DWVU02l/view?usp=sharing_eip_m&ts=62b4cfe4&sh=kaQkhHxzrDFFYdci&ca=1
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1540
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1540 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1048

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Command and Control

Web Service

1
T1102

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    Filesize

    471B

    MD5

    562de9eb95ffc158a8e5eb00e939947f

    SHA1

    b3727882848988e42954e4ec91018839bf5bdcd3

    SHA256

    c6219867e6e26925c58f47374369d9ec680296e9b2a46cc60e27c632f606d556

    SHA512

    25a4fe70e451e5ae4f3d9f7674c1deebfb9b2ed948f89407aeb60a260767af1c57f7cac56d543c22808bd3e8cb929de6ffc6b4e1143482e7d160130c07dd387d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    Filesize

    434B

    MD5

    c926aa382f3fef7520b19532530468ce

    SHA1

    aad5eda04f29e84eadd447da53c1e1d069cc2ef1

    SHA256

    a93229a0a1fd897ec054796d15c7a533a0254685f0aab058fb15cca5774f249f

    SHA512

    8467f0ce0db40232fa57e58d81599bdd9074ce1c64cc0f77d2c7de01300d86a0ffed149b2a0f0f251c616145ca8ee4528fa76db55eb7854fdb4db6c682d2053c

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\2klo80q\imagestore.dat
    Filesize

    5KB

    MD5

    ba4c357df85e23c7e408e66a68fbcd14

    SHA1

    c047e585028fc663d3427838e2fca2f2f5ca4492

    SHA256

    d22d1f0579e9c00d2a66af7f10078c8c398a8d974ccfdda10486c2eaba3ccd01

    SHA512

    6afd203a85fba7806ddc69362ba54bcd141a438acecce2067c692c7ddd0e61ad2462a03ac6927894c3a655329ea796e146a1a3993b3afc40dbd065a54086053d