Analysis

  • max time kernel
    134s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    09/09/2022, 17:41

General

  • Target

    https://storage.cloud.google.com/solttitll098/upgrade/thenewgenautoindex.html#[email protected]

Score
10/10

Malware Config

Signatures

  • Detected google phishing page
  • Modifies Internet Explorer settings 1 TTPs 37 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://storage.cloud.google.com/solttitll098/upgrade/thenewgenautoindex.html#[email protected]
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1044
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1044 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1484

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          340B

          MD5

          d9dff9db55c61a96946883fca99ec9f5

          SHA1

          2ee3b5bb7fbc40d9e49709acff44da7d19bed0f1

          SHA256

          4a05492d586546a7df90f676720069df0873179ffe8fd721e1696635b9813a25

          SHA512

          d47688663e44c3a55cf22dff9240e31cb285cfd10dc09567eb148f82417c762504c796628a8b2b338a81874290e98351ab31a09cacf02feca60ebf772a6ed541

        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\tcz8fqz\imagestore.dat

          Filesize

          9KB

          MD5

          8a15f654ab58d7c5d6cb581d995219f6

          SHA1

          55466ba5dbe9fe5a57922b1470bf782ebd0a5168

          SHA256

          8d9f02fd49f66075edf9d87ca42fe031437f1a407c788d9ef9b926f7a35c3bf2

          SHA512

          f5f21e952434f5c0062f30951b143c1ea8d5a44b603909a314aacd6b77a852f3e2685bd127b68a7088975afab9e9d680ece3d1df1e671efe7930b4ec5f3b0e2e

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\YEXCZ2FD.txt

          Filesize

          603B

          MD5

          e075a24f88dc9a038f0b9fbad2854b1e

          SHA1

          9787b73b145fbc155b3f304d01e33e361333c25c

          SHA256

          74e864c246d16d0181c4e63f52538d2be568b01eac9486219ba84ebde532ed93

          SHA512

          21b937996185c108ef9197488e3b88a5d8e8e91160ad1533157fb1045af63b4045087a8d4caa28a5e674a36d30e25980bab17a64a1d05bfbae1a210d69c0ec60