Analysis

  • max time kernel
    124s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 18:38

General

  • Target

    http://www.google.com/gen_204?atyp=i&ei=MWR-Y8H2GMTMkPIPnP-LsAM&ct=slh&v=t1&im=M&aqid=MWR-Y9CvIYDVvdMPs7G1sAw&pv=0.3482816808327416&me=1198:1669227620751,h,3,6,i:1,h,3,0,i:60,h,3,6,o:0,h,3,0,o:0,h,1,CFsQAA,i:0,h,1,CGgQAA,i:0,h,1,CAgQBQ,i:17,h,1,CFsQBw,i:52,h,1,CFsQBw,o:0,h,1,CFsQAA,o:0,h,1,CGgQAA,o:0,h,1,CAgQBQ,o:3,h,1,CAgQBQ,i:12,h,1,CHgQAQ,i:0,h,1,CHAQAA,i:33,h,1,CHgQAQ,o:1,h,1,CHsQAQ,i:16,h,1,CHsQAQ,o:1,h,1,CHkQAQ,i:133,h,1,CHkQAQ,o:1,h,1,CHsQAQ,i:16,h,1,CHsQAQ,o:16,h,1,CHAQAA,o:16,h,1,CFsQAA,i:0,h,1,CGgQAA,i:17,h,1,CFsQBw,i:385,h,1,CFsQBw,o:0,h,1,CFsQAA,o:0,h,1,CGgQAA,o:0,h,1,CAgQBQ,o:3,h,1,CFYQAA,i:0,h,1,CGgQAA,i:0,h,1,CAgQBQ,i:5,h,1,CFYQBw,i:326,h,1,CFYQBw,o:0,h,1,CFYQAA,o:0,h,1,CGgQAA,o:0,h,1,CAgQBQ,o:3,h,1,CFUQAA,i:0,h,1,CGgQAA,i:0,h,1,CAgQBQ,i:6,h,1,CFUQBw,i:3508,R,1,CFUQBw,168,1449,207,369:0,G,1,CFUQBw,81,119:0,G,1,CFUQAA,62,75:0,G,1,CGgQAA,221,75:0,G,1,CAgQBQ,221,941:1174,T:0,N,8,M2R-Y_iNGICAgLAPAA,20:0,C,8,6:0,R,1,9,-15,1093,1121,127:0,R,1,10,26,1160,92,15:0,R,1,CAEQAw,78,85,103,45:0,R,1,CAEQBA,183,85,

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 35 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http://www.google.com/gen_204?atyp=i&ei=MWR-Y8H2GMTMkPIPnP-LsAM&ct=slh&v=t1&im=M&aqid=MWR-Y9CvIYDVvdMPs7G1sAw&pv=0.3482816808327416&me=1198:1669227620751,h,3,6,i:1,h,3,0,i:60,h,3,6,o:0,h,3,0,o:0,h,1,CFsQAA,i:0,h,1,CGgQAA,i:0,h,1,CAgQBQ,i:17,h,1,CFsQBw,i:52,h,1,CFsQBw,o:0,h,1,CFsQAA,o:0,h,1,CGgQAA,o:0,h,1,CAgQBQ,o:3,h,1,CAgQBQ,i:12,h,1,CHgQAQ,i:0,h,1,CHAQAA,i:33,h,1,CHgQAQ,o:1,h,1,CHsQAQ,i:16,h,1,CHsQAQ,o:1,h,1,CHkQAQ,i:133,h,1,CHkQAQ,o:1,h,1,CHsQAQ,i:16,h,1,CHsQAQ,o:16,h,1,CHAQAA,o:16,h,1,CFsQAA,i:0,h,1,CGgQAA,i:17,h,1,CFsQBw,i:385,h,1,CFsQBw,o:0,h,1,CFsQAA,o:0,h,1,CGgQAA,o:0,h,1,CAgQBQ,o:3,h,1,CFYQAA,i:0,h,1,CGgQAA,i:0,h,1,CAgQBQ,i:5,h,1,CFYQBw,i:326,h,1,CFYQBw,o:0,h,1,CFYQAA,o:0,h,1,CGgQAA,o:0,h,1,CAgQBQ,o:3,h,1,CFUQAA,i:0,h,1,CGgQAA,i:0,h,1,CAgQBQ,i:6,h,1,CFUQBw,i:3508,R,1,CFUQBw,168,1449,207,369:0,G,1,CFUQBw,81,119:0,G,1,CFUQAA,62,75:0,G,1,CGgQAA,221,75:0,G,1,CAgQBQ,221,941:1174,T:0,N,8,M2R-Y_iNGICAgLAPAA,20:0,C,8,6:0,R,1,9,-15,1093,1121,127:0,R,1,10,26,1160,92,15:0,R,1,CAEQAw,78,85,103,45:0,R,1,CAEQBA,183,85,
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:5024
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5024 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:4768

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    e32d02ce684c01ef3af05fae9066160e

    SHA1

    29c7a6e8ed553ac2765634265d1db041d6d422ec

    SHA256

    b00322d178a6cfc206458c26b26d6c80596073bb3283dcc3fc4e33a4b5f29d71

    SHA512

    e4e3175fb131095e4681ecb76d14dc74d059c0beafb6340965516c6d3d0538deb314b36a3f09df03b491edac84d5c0580e764fed1d8bca9abd4e65cb56167148

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    434B

    MD5

    2ac6c8ea67be9f551edd90f2dbbd9af8

    SHA1

    125bfcc4bbb843f73cc5bb073e7ddceb111ce4d4

    SHA256

    e04cb84db5bab47856dc40b849b710296313a276fa0e55b32b311412b679f458

    SHA512

    27e82879832665abb6d246a60cae6095a50534abddac57188e86cc704f0555841060a4b50a08747a0c87ff6ed03f13baab8fa6213bd97055dc9d20e8521d4086