Analysis

  • max time kernel
    142s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    29-06-2022 01:35

General

  • Target

    https://drive.google.com/drive/folders/1oSUecu-3vvp8lURJjPkSToLb-wQDKpvf?usp=sharing

Score
6/10

Malware Config

Signatures

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Modifies Internet Explorer settings 1 TTPs 47 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://drive.google.com/drive/folders/1oSUecu-3vvp8lURJjPkSToLb-wQDKpvf?usp=sharing
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:868
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:868 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1692

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Command and Control

Web Service

1
T1102

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    e9672818e093e31a6f0f961a9ce21fd0

    SHA1

    16f4e821d3453990d8e5dc4c7ea21565ab44a30d

    SHA256

    054be683469ba7432e38fdc77aa18ee7a70ee0af66373f2a6664df21e766e771

    SHA512

    06913e060003d7f1a1ccd4c41985484cbcc5ec1df50d942320703b34e652a7bcd1dbb9d0253c1a93f4d680567d6f6b10bcfaa617cae0d65f47c1c6a9906d2664

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\9os4y76\imagestore.dat
    Filesize

    9KB

    MD5

    e10ed615ecd7e07eb5dce0817797225c

    SHA1

    da8328ed019ace2f64106aa185a0f7ea14b6ee7d

    SHA256

    5367a1e4cc8b77659aefbc657078c17808971dc206de98a3384b0076d9fc2a02

    SHA512

    06755a9bdb206502e350a8af1e96c86970ef8174696a75c5aa7824bd1d1c7f22141ac9f87563aebd3e2307bddf0c8a7f91e815c0311d59b38338862dadea31f1

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\Q0I0CQ4M.txt
    Filesize

    604B

    MD5

    6a38464855b97b2fadf24097c53dc3d9

    SHA1

    de7b2d7e45aa50e6c88c3a3ff58bf74ab42f1204

    SHA256

    1e8a4f485942e0f978ab87b4bcf6e2f81feca939efead9e26ea61a8fe27b6312

    SHA512

    d8f237a0360cdb1b58d2d3803af61cbdd1eb284d3defae015d68e1cbfff2ff4a5c367b5880664b29362cc454bd8005c590d8c37c5ea08c0bdf23e470cde010c8