Analysis

  • max time kernel
    133s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220721-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-07-2022 18:02

General

  • Target

    https://docs.google.com/document/d/1UC3p0TNsx0Deyz7vev1G7DCMDm5pyZTZf9At91kgH-E/edit?usp=sharing_eil_m&invite=CLqCgvIH&ts=62e17912

Score
5/10

Malware Config

Signatures

  • Detected potential entity reuse from brand google.
  • Modifies Internet Explorer settings 1 TTPs 53 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://docs.google.com/document/d/1UC3p0TNsx0Deyz7vev1G7DCMDm5pyZTZf9At91kgH-E/edit?usp=sharing_eil_m&invite=CLqCgvIH&ts=62e17912
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4560
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4560 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:4700

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\37zaxn3\imagestore.dat
    Filesize

    5KB

    MD5

    9cbbc28d0a1649f8244adb5ad1f76fd4

    SHA1

    aa17dc8d0099c45a700e4fb01b86ce477e9008ce

    SHA256

    b8a1baeeb4432f8db4831ce4f11fcabc7b0ed1e6506fa74b0f29462890e7830d

    SHA512

    9fcdf28bb104037d54752f389ad6aa3624004022d7f5b07bb7d30b76ae726ad85dab80aecaa6bd775ee9c83edbf41e4cc9bd170c6d13a6754916c583f69d8e3b

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\RUEIZMHE\favicon[1].ico
    Filesize

    5KB

    MD5

    f3418a443e7d841097c714d69ec4bcb8

    SHA1

    49263695f6b0cdd72f45cf1b775e660fdc36c606

    SHA256

    6da5620880159634213e197fafca1dde0272153be3e4590818533fab8d040770

    SHA512

    82d017c4b7ec8e0c46e8b75da0ca6a52fd8bce7fcf4e556cbdf16b49fc81be9953fe7e25a05f63ecd41c7272e8bb0a9fd9aedf0ac06cb6032330b096b3702563