Analysis

  • max time kernel
    156s
  • max time network
    204s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 18:38

General

  • Target

    http://www.google.com/gen_204?atyp=i&ei=MWR-Y8H2GMTMkPIPnP-LsAM&ct=slh&v=t1&im=M&aqid=MWR-Y9CvIYDVvdMPs7G1sAw&pv=0.3482816808327416&me=1198:1669227620751,h,3,6,i:1,h,3,0,i:60,h,3,6,o:0,h,3,0,o:0,h,1,CFsQAA,i:0,h,1,CGgQAA,i:0,h,1,CAgQBQ,i:17,h,1,CFsQBw,i:52,h,1,CFsQBw,o:0,h,1,CFsQAA,o:0,h,1,CGgQAA,o:0,h,1,CAgQBQ,o:3,h,1,CAgQBQ,i:12,h,1,CHgQAQ,i:0,h,1,CHAQAA,i:33,h,1,CHgQAQ,o:1,h,1,CHsQAQ,i:16,h,1,CHsQAQ,o:1,h,1,CHkQAQ,i:133,h,1,CHkQAQ,o:1,h,1,CHsQAQ,i:16,h,1,CHsQAQ,o:16,h,1,CHAQAA,o:16,h,1,CFsQAA,i:0,h,1,CGgQAA,i:17,h,1,CFsQBw,i:385,h,1,CFsQBw,o:0,h,1,CFsQAA,o:0,h,1,CGgQAA,o:0,h,1,CAgQBQ,o:3,h,1,CFYQAA,i:0,h,1,CGgQAA,i:0,h,1,CAgQBQ,i:5,h,1,CFYQBw,i:326,h,1,CFYQBw,o:0,h,1,CFYQAA,o:0,h,1,CGgQAA,o:0,h,1,CAgQBQ,o:3,h,1,CFUQAA,i:0,h,1,CGgQAA,i:0,h,1,CAgQBQ,i:6,h,1,CFUQBw,i:3508,R,1,CFUQBw,168,1449,207,369:0,G,1,CFUQBw,81,119:0,G,1,CFUQAA,62,75:0,G,1,CGgQAA,221,75:0,G,1,CAgQBQ,221,941:1174,T:0,N,8,M2R-Y_iNGICAgLAPAA,20:0,C,8,6:0,R,1,9,-15,1093,1121,127:0,R,1,10,26,1160,92,15:0,R,1,CAEQAw,78,85,103,45:0,R,1,CAEQBA,183,85,

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http://www.google.com/gen_204?atyp=i&ei=MWR-Y8H2GMTMkPIPnP-LsAM&ct=slh&v=t1&im=M&aqid=MWR-Y9CvIYDVvdMPs7G1sAw&pv=0.3482816808327416&me=1198:1669227620751,h,3,6,i:1,h,3,0,i:60,h,3,6,o:0,h,3,0,o:0,h,1,CFsQAA,i:0,h,1,CGgQAA,i:0,h,1,CAgQBQ,i:17,h,1,CFsQBw,i:52,h,1,CFsQBw,o:0,h,1,CFsQAA,o:0,h,1,CGgQAA,o:0,h,1,CAgQBQ,o:3,h,1,CAgQBQ,i:12,h,1,CHgQAQ,i:0,h,1,CHAQAA,i:33,h,1,CHgQAQ,o:1,h,1,CHsQAQ,i:16,h,1,CHsQAQ,o:1,h,1,CHkQAQ,i:133,h,1,CHkQAQ,o:1,h,1,CHsQAQ,i:16,h,1,CHsQAQ,o:16,h,1,CHAQAA,o:16,h,1,CFsQAA,i:0,h,1,CGgQAA,i:17,h,1,CFsQBw,i:385,h,1,CFsQBw,o:0,h,1,CFsQAA,o:0,h,1,CGgQAA,o:0,h,1,CAgQBQ,o:3,h,1,CFYQAA,i:0,h,1,CGgQAA,i:0,h,1,CAgQBQ,i:5,h,1,CFYQBw,i:326,h,1,CFYQBw,o:0,h,1,CFYQAA,o:0,h,1,CGgQAA,o:0,h,1,CAgQBQ,o:3,h,1,CFUQAA,i:0,h,1,CGgQAA,i:0,h,1,CAgQBQ,i:6,h,1,CFUQBw,i:3508,R,1,CFUQBw,168,1449,207,369:0,G,1,CFUQBw,81,119:0,G,1,CFUQAA,62,75:0,G,1,CGgQAA,221,75:0,G,1,CAgQBQ,221,941:1174,T:0,N,8,M2R-Y_iNGICAgLAPAA,20:0,C,8,6:0,R,1,9,-15,1093,1121,127:0,R,1,10,26,1160,92,15:0,R,1,CAEQAw,78,85,103,45:0,R,1,CAEQBA,183,85,
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1704
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1704 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1516

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\TWORC15T.txt

    Filesize

    608B

    MD5

    1e23e647f27fb3dfd072ce41379909f2

    SHA1

    b7ca766ad21f79f2d00431e8fcd1e4e6e707254b

    SHA256

    cbc816c019d08497a6815792438d8330cbb5d53f9429da6f43d436fa61cc2f44

    SHA512

    1a92d7c3717dd958b2e3b56aacba8dfc4a9e01d8b98289aaf820b05306053b3e01db40dc6f50d40ccb99c091eb7ad026552374123468aa1800d11a1c72a8f987