Analysis

  • max time kernel
    130s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    06/02/2023, 14:12

General

  • Target

    https://docs.google.com/drawings/d/1msdGtpNQtFHfCphJoX7H0Af7nwevevJBkFREia1_RJs/edit?disco=AAAAooF9Yow&usp=comment_email_discussion&ts=63db8892&usp_dm=false)

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://docs.google.com/drawings/d/1msdGtpNQtFHfCphJoX7H0Af7nwevevJBkFREia1_RJs/edit?disco=AAAAooF9Yow&usp=comment_email_discussion&ts=63db8892&usp_dm=false)
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1104
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1104 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:472

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8fed1dca21928bbac643a30f1592f00a

    SHA1

    2b4fb9601d5724dd81097dab63ed1736f50430d1

    SHA256

    2fe912e36ca4a14093ad392ba91d354c238f28d3d66884f07b86b688139a77ee

    SHA512

    c57ac9de0e4112bf89a268819c0cb7a383f90f8c6522fde8fc1a2e56ce5fb44ba5edc268801e93dfbea75eba2888ab1575c598615d9896df5afe9a6b51a3a909

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\t9o3c8r\imagestore.dat

    Filesize

    5KB

    MD5

    e4bbee779b8ab96a9afff74f024d0ca7

    SHA1

    988d7dcd53b45b269c6a53512f400e534e7dd582

    SHA256

    e575ae6ee41338af700b28ad72dcfd1a43a737657d4d67811bc8654dab58ab4f

    SHA512

    e2ebbd21856d1886e5903fed17a84e4568e5411feab2b6983e7e2f9bf0c73e530197f4f73a90730343af2e68f71cb8592587ec3fb63dfafa0f546e58de04d1d9

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\1TMLX4I1.txt

    Filesize

    608B

    MD5

    795fbb4de3a64b5a99b1fc318cdbafdf

    SHA1

    b0b93fa7a85185c4bca2adc5b1ff219af1f628ba

    SHA256

    2fa18a8cc335c1d6a420c0f126db2a2855eb8477f12ba743f388dfbcb3f3b4ff

    SHA512

    29853ba65a7334af7c80cd51eee8ad8f66e7683f005bc3e61d403b95f67dd8b59b4fb4339fffc192d69076d925757f1aec10b53f5b5c9dd56cc72c974ee9ddd7