Analysis

  • max time kernel
    163s
  • max time network
    174s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    13-07-2022 07:32

General

  • Target

    https://docs.google.com/document/d/1M-xyAHNIllWsSOANw_w68k_HMj5jQf7_B4jHbAL2F1k/edit?usp=sharing

Score
5/10

Malware Config

Signatures

  • Detected potential entity reuse from brand google.
  • Modifies Internet Explorer settings 1 TTPs 51 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://docs.google.com/document/d/1M-xyAHNIllWsSOANw_w68k_HMj5jQf7_B4jHbAL2F1k/edit?usp=sharing
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1312
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1312 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:5048

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    Filesize

    471B

    MD5

    f926125f68ade028c2d35d69c2ba8f2f

    SHA1

    c5a34f75d9788131c87708e527849319b857287f

    SHA256

    17904874e9f80d18373ea20197df2841b140d6fce600720fa7f3b4ec335c68a4

    SHA512

    bc6a947542759fd913f84ea6bf457f190331fda1f8266233017eaa473782603e0367ae67698b2cff29b3a247bc1a2e82018412ff5158f8528efa5cddd4841c8b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    Filesize

    404B

    MD5

    a7c69d468eb8c9caff36da7c9f01124c

    SHA1

    87cdfa2f007b1db07c1b482b9e5572632fb667c8

    SHA256

    2563838072e60781e2f08e274aa747f06a2efe026a367b9206705aef5d529f82

    SHA512

    4cfdf76265599b48b00f15ca39fd9a301756aa1605b7980645c9051bf9f1bd29b65e9820e8505313c926e03a73ffa76343145ef615f3d43fa8f94c148ec1c5c8

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\1dmutkj\imagestore.dat
    Filesize

    5KB

    MD5

    0716972669d94021e78e084b3ead6614

    SHA1

    e4c4c75217dd349282b1a97c6963cdb12e2fb407

    SHA256

    7678fe78ef52ca927372333cc893143f141dc60068b57eda497f174bc5661c18

    SHA512

    da460f204833d5a036ac81e89210ffc5f90637bb2a59210ca02df75493aa066cceabed14ea19ae3d1e3fc816cc9e80791db5eb3815c88bc1d390ab68c4982727