Analysis

  • max time kernel
    134s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/02/2023, 14:12

General

  • Target

    https://docs.google.com/drawings/d/1msdGtpNQtFHfCphJoX7H0Af7nwevevJBkFREia1_RJs/edit?disco=AAAAooF9Yow&usp=comment_email_discussion&ts=63db8892&usp_dm=false)

Score
5/10

Malware Config

Signatures

  • Detected potential entity reuse from brand google.
  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://docs.google.com/drawings/d/1msdGtpNQtFHfCphJoX7H0Af7nwevevJBkFREia1_RJs/edit?disco=AAAAooF9Yow&usp=comment_email_discussion&ts=63db8892&usp_dm=false)
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4708
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4708 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1252

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    aee722fcdc90fcfba473126bf8bed12b

    SHA1

    df62a695b671a248b19f76cd6d420d1bcee9c27d

    SHA256

    e759250bcfe36a1a745bc1cc241dea84b6c791141e93b322bd5027d62d3a4807

    SHA512

    e51c09b66f06f247289841147cc6ebf2b70308cfac2c500915ed2b4775813e48422e60779e50351ac668bab548afaccb822a1486ae8242bc37697f16f3a994cf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    404B

    MD5

    605660706355ece0389ffb0bbe69afba

    SHA1

    9f7d989caaf7d5b16e690c25348e7ae52576ba19

    SHA256

    4be1fde58eb9680657c6ff6797089f56879a458fb0ffba431d143b4d797dcbf8

    SHA512

    f3bb41b9d2e871779161d029c0c092ad13a0842f7cb0059e5244fe5a60ecfc2924cc6319969191276b9cc7c41591144800d2653e1702db9044fdb3ab1d140c05

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\zpu22o1\imagestore.dat

    Filesize

    5KB

    MD5

    525e70eccdfb12cc2f0dda45be0e3af2

    SHA1

    045ea738d591064a1b33aca84a097270f919aaa0

    SHA256

    054e8db428dc6f004c0904f29cf5b39dac3e87562e2be7f7bf57b686f3ad3254

    SHA512

    96e8509677dc6fc87fbfa8dcf9c280dcab1cc2b220dcbdc51a3e00121008231078519d48750e928d1ef3fa9992acae2eb14e36ad3af0ae74eb9da4c2b4e39aba