Analysis

  • max time kernel
    68s
  • max time network
    71s
  • platform
    windows7_x64
  • resource
    win7-20220718-en
  • resource tags

    arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system
  • submitted
    11-08-2022 13:35

General

  • Target

    http://google.com

Score
5/10

Malware Config

Signatures

  • Detected potential entity reuse from brand google.
  • Modifies Internet Explorer settings 1 TTPs 57 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http://google.com
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2020
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2020 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:1724

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    340B

    MD5

    e13c752a3563f77a809a5a1825d5bbcf

    SHA1

    cc912b60e08862b6ca31d3069c7fa3bff5fc6e96

    SHA256

    91db15b7a4676345b56a21100cd3d52a35039da72095c737df832136255043ea

    SHA512

    4fb39de83ef47665ac0a388159ce092f47724687a3881b00c3b2b75ac381df4552b654fe3be7a5f1a13f9ff1c830c38bf0b1f3aae7bb9d91cab2ad268e2df01b

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\78o90ak\imagestore.dat
    Filesize

    9KB

    MD5

    d6161ab79fe57e297fb39aa2421d2ae4

    SHA1

    b5c06bc799743a6333e9430480154acfda8d1a27

    SHA256

    9a7fa75f4f34015e4c72f4e449a2761b182919606b546417ed638ad44a4897c8

    SHA512

    2a72f7a2cae153d9e4590d4485d7ce2ebaf6b6da7ba16708f5c9718f5a7939ab5c6d9d9c601d4b5467edde4cf73e2d5b491bba6291af4fc86711bf3c8f3feb39

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\78o90ak\imagestore.dat
    Filesize

    15KB

    MD5

    971c57d5f0c812a7d0707244aff69efd

    SHA1

    4f9bb99477f8abf6d375dc36a670d84e1e8781fb

    SHA256

    6b9b81092455117ac89e75124dccaa2b1019e3d8c61671a92ae56efd9bcac394

    SHA512

    bac5fc26ffccec32cc21bea652dd6ea44aa91d47deca1528e2531a4b5d9135ff44c7869f00f1b636adc9a8eee4eb291a7a36d24f5c8fd4bdaa6eb42708d3eaa3

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\FV2I9014.txt
    Filesize

    603B

    MD5

    cf7252bd70a457592dfdbf82ce46891a

    SHA1

    5111f345da8d15e73d5ff43e6107ee6876d8acd4

    SHA256

    6a981fc61b997df3b52db7b0b4df2cdec057ded0fcf89c2b3526b170fc66b36e

    SHA512

    2fb38599c652c52029f9f96102499dbbbcccfcc53666924079d4a54039d26f12be704633ecd002ed93317bcbd22377f7fe865ed2668ec99a17e6a0e3b69603a0