Analysis

  • max time kernel
    134s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    24-06-2022 19:47

General

  • Target

    https://bit.ly/3HwkhH6

Score
10/10

Malware Config

Signatures

  • Detected google phishing page
  • Modifies Internet Explorer settings 1 TTPs 50 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://bit.ly/3HwkhH6
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1556
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1556 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2024

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
    Filesize

    60KB

    MD5

    308336e7f515478969b24c13ded11ede

    SHA1

    8fb0cf42b77dbbef224a1e5fc38abc2486320775

    SHA256

    889b832323726a9f10ad03f85562048fdcfe20c9ff6f9d37412cf477b4e92ff9

    SHA512

    61ad97228cd6c3909ef3ac5e4940199971f293bdd0d5eb7916e60469573a44b6287c0fa1e0b6c1389df35eb6c9a7d2a61fdb318d4a886a3821ef5a9dab3ac24f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    fe007c572be27d6b28802c4227f36eab

    SHA1

    cb415a8351a49037c78b4e6f714fe58b9c65f471

    SHA256

    dc74d1c63ffbef3018fe95345ddb3fd0b6f37b823d61ae2699fe49b082c3fbfd

    SHA512

    fc4e6055ebfcc839ae6cb38b51c1ef9a85887e845b13842408115ed809acd506348a80743cf59fbaeab2cb65e620d58b447668d632f4405610821346395ed5cd

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\9os4y76\imagestore.dat
    Filesize

    9KB

    MD5

    d36e7e9615f5d9249eb87ceb6f00ce60

    SHA1

    9daecba45e11c927a1bdf59f379f768d2c39e0c5

    SHA256

    c384147eafa8a5de9caa94dc488625a2141261832600ee7dfcbdd4d6c15dd899

    SHA512

    d9a88abbb07be8decb43f7a8aa152cd4e8f72891d1545162dd420884b188f7f2c7f111c5b76aee302ab21754eaa3dbee56d7d17a3924e0d6a1bce1d7c9b9d5b8

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\YA5GCJMD.txt
    Filesize

    599B

    MD5

    8e263349d7d31f70956ab7840fd2f888

    SHA1

    ec0182d68ec1410ad114dc05afcd591918b707db

    SHA256

    948c5a70bce5a0d3b92b0ee5ff87ef81f6a8b124e711e450c12925b0ca60f70f

    SHA512

    94df0c18766d04bae30e08b355760bb46b90da735c50986e2561f09069ef3b22792322c1ae1ffb2f7165685de73fc2c13adf77767a57efef7765f264283c3500