Analysis

  • max time kernel
    142s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    17-08-2022 21:10

General

  • Target

    https://docs.google.com/forms/d/e/1FAIpQLScVrXX0TcywGASjMrJ1evpX5TFkZKc9kx3PxscaUQIQ9j4g2A/viewform?usp=sf_link

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 47 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://docs.google.com/forms/d/e/1FAIpQLScVrXX0TcywGASjMrJ1evpX5TFkZKc9kx3PxscaUQIQ9j4g2A/viewform?usp=sf_link
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:752
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:752 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1744

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    340B

    MD5

    475e641a00f7fa67a83b26d15f83e3b6

    SHA1

    da718b699eed69095d51ed6e3b594fa5ec3cafcb

    SHA256

    e4f441f64f168bd3e9bd89caae0ee6bcd0e701c293ba91020d46e23333366c9e

    SHA512

    9e5f9e8549e6febc413c9fe9964923ff7a99c13ad0033db78a32bc7f06f10298b2f36440c08fe715572157df279bf0f02fad338ae0937cb1f7df32706ef2a9b3

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\tcz8fqz\imagestore.dat
    Filesize

    9KB

    MD5

    5a50bc6b0a5b5d543df5f4f69c45b401

    SHA1

    8733181ee93752b202512633989bfd7cedfb7bfa

    SHA256

    fbacc36df6cf8aeceda2a78e20282eb8f0a5c53178f0a316be679f740c5f5625

    SHA512

    9ca39d3df38cc49b4578b1443f13f8738b5603ad9a8918ba17c4b34c4419f2a9149fec31631b168c37037461788761c77d8427792179e68e293943992d72a225

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\SLGIH1CF.txt
    Filesize

    607B

    MD5

    1910b5cdc8bc5d670587f607ae53e73d

    SHA1

    453037eb8f0b8185ec085d992db507a37414be7e

    SHA256

    6614aa20ed105452f91932bae3863a544004633961b656928e50aa0956df2405

    SHA512

    45bfc014733fecf86015eb1dcb30504d2dd4cee74130bf6091520ff0cec18ffa6af125a3a51b68a723e383e590023fff691473dbdf73003b04cbbd3d30fcd6c6