Analysis

  • max time kernel
    74s
  • max time network
    136s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    17-08-2022 16:55

General

  • Target

    https://drive.google.com/file/d/1w3jms9a9-y6lnCH0v8Jfq44wNOLFWP8-/view?usp=sharing_eip_m&invite=CN3TtJUE&ts=62fd142b

Score
10/10

Malware Config

Signatures

  • Detected google phishing page
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://drive.google.com/file/d/1w3jms9a9-y6lnCH0v8Jfq44wNOLFWP8-/view?usp=sharing_eip_m&invite=CN3TtJUE&ts=62fd142b
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1504
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1504 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:964

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Command and Control

Web Service

1
T1102

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    340B

    MD5

    037410dfd85a3b92d6499c69bb6a3cc1

    SHA1

    67dee9c0c88516c9df8a8fbf32f85db106952a6b

    SHA256

    e620acdb46850bb381ad4e7a595a1d000ff96d7c7a0eb07925af365ef55ecf2c

    SHA512

    355eb4fbd0077e0ec59e23118d9db97abdc9b0d4e1471330a446111c1c726329f303a089075972a95be9c1119cbcd7e3ddc84c1999e5aa1ed7c544921ac1c35c

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\1evexod\imagestore.dat
    Filesize

    5KB

    MD5

    fe172f093b235ff0d5ba30fe0b1e4d1d

    SHA1

    3039402adcb583023ce9dfee16d5dbc3ea6a5911

    SHA256

    053a8b91605f835f146b7b288cf1c56dd354707c6eb023f24f50a1aa058b3113

    SHA512

    f4a7cba9886ef2f0cb2f9bad185a3e1fd4f13d6aa106826b65a00c29f62c83d77655e2d8000b567ce9a696091a237e7526781e6521c9164879df5930cc88ef52

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\87SEUQ0R.txt
    Filesize

    601B

    MD5

    5fef5b2d7f518c65c8c5d4ac519b11ed

    SHA1

    442f3727933f4732e266c2a2ffc945d181d7e3c5

    SHA256

    b21125aaf80034fa1f18fbf7944b554cc34a8a4f8ff4a65236c1a7274389f573

    SHA512

    7efd2d98aa647bc620d5b66bc14c61e4812049940c446bf449dc25701e8a7799b101256a240cd2f4d51c5a9509d865e926083f3accfa446abe9bfba6a59ba06f