Analysis

  • max time kernel
    139s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    13-07-2022 10:51

General

  • Target

    http://page.link

Score
10/10

Malware Config

Signatures

  • Detected google phishing page
  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http://page.link
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1864
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1864 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1588

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    e2be77e220403fbefeec9cbde761ffdb

    SHA1

    c777af2f0fa4b6f8710eb392353200d6118be0d3

    SHA256

    37af53a0c69f4e16fefbddd66717702443d0f95c07d7a652251a6afa2aabd376

    SHA512

    6bab3cb1f9f1df0db1560fab0766e164ada89204ec6115ce7dc8309ea0c5218322efeca312ab7ea3371ebbabc6212bd963209329fce47bc76090afb290e159b2

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\k007hrg\imagestore.dat
    Filesize

    5KB

    MD5

    91f55aee14f88a5ea4e56e863687723d

    SHA1

    276cec35b73953ddc10d3c58abc50ab33dcd5fd0

    SHA256

    c29b5210253b88cd848b10979036dccd977dc51e937189d44a0c62ad1f133b9a

    SHA512

    c1ef850d7b62fc1ca032fd231d51d08078921103776968507fc8f73374170b78c2478ab81dd7b71649d8b702247553f332182f0a5831e1fd88fbd200a5018389

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\k007hrg\imagestore.dat
    Filesize

    10KB

    MD5

    f809bc437f5a96bac20f017c14fefe1c

    SHA1

    fd3fc0f9d068c1642653484f5d7f13ac37360f5e

    SHA256

    a6fe899bdf30f81624a8155169b0efac957fd627b87af23b20de86a25b4ea80d

    SHA512

    d880187f5fa0ac384493d49772a27e4d94bf6719c02b80932d9a8b2276f35843be4a96b9bc5806cca68eeb8ac456655305201c20bfbcb7c3ebf63fa585307d2f

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\WZ8W4E5Z.txt
    Filesize

    604B

    MD5

    c1bc395ca3c95265718f8a44967b46cd

    SHA1

    0d47ff4ed329385bb9513fa3a94bf8e117ee5e2c

    SHA256

    d1f7b9b64eabc6a13b199199880b1d58a0a14fc7f14023233983f70b67d90921

    SHA512

    66966f16960eddd27acfb1e75281ea2441069bd18d0522668f2161a7a707b1ef2009f1dba801844da501f4f1319b659c2382049142707770110e86d0f3090633