Analysis

  • max time kernel
    141s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    13-07-2022 07:32

General

  • Target

    https://docs.google.com/document/d/1M-xyAHNIllWsSOANw_w68k_HMj5jQf7_B4jHbAL2F1k/edit?usp=sharing

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 47 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://docs.google.com/document/d/1M-xyAHNIllWsSOANw_w68k_HMj5jQf7_B4jHbAL2F1k/edit?usp=sharing
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1660
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1660 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2020

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    b2aff495398fc3d1173a4c246cb781db

    SHA1

    b81e5d455fd98ccfd312785f557a8219dc351244

    SHA256

    69e3a5dd8812ef3e5ba3a4a474cf7d93ec2434d31a5fb06789099419470d0feb

    SHA512

    15b87044fecea197cce9d06c758f6759baf19d651bb7ab73bca8aecc483253351791bcf1345ec0a354e65e5110255e44562eacd88fa341aa3bae29a49cf8c3e3

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\1b4wh1e\imagestore.dat
    Filesize

    9KB

    MD5

    26f06470fd2048cf99e51d4a0d3330f1

    SHA1

    3bb042388a86ca03bfb6786af121f0a83424da81

    SHA256

    c5c4059ebb533f5b0d0980da69da1d41158db9f4cf388673d48ee5c924878991

    SHA512

    4eb3fa46f7c4327219a4f57821fa2ced7e83af118cd74fdb48cd36787e7049e4448038f87913e7ff8ddd3ec160f8178742c99fe3f38cfe8221cab33124c63ffd

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\E30UJEX0.txt
    Filesize

    608B

    MD5

    4f0fb3c4c1ee53ae4b76e2cb76a85199

    SHA1

    e76b8633c68051c1715660e9d1f487f65a2bcf7e

    SHA256

    ffe67c4d3890a70dda247ca6c9e5c0dd357d93486ef1fde36330d655e7b5aa48

    SHA512

    568f72c40a1cf2f39d62c07d257d35e3b23e74e2b7fb0487b5c7b44e204b9a7a2e81f3d13602ebe561a3edd3bbdb2407c8871420eaad1a4888b291bbabc8cd42