Analysis

  • max time kernel
    0s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    12-01-2024 04:37

General

  • Target

    https://docs.google.com/presentation/d/e/2PACX-1vSykO4_SbpUf2oCt249FHDhdyPYctjF2FZcD9c6w9dc1Ut7Y3MJHc-B-dJGiny4QYnL8k3CXP8yyY7s/pub?start=false&loop=false&delayms=3000

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 18 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://docs.google.com/presentation/d/e/2PACX-1vSykO4_SbpUf2oCt249FHDhdyPYctjF2FZcD9c6w9dc1Ut7Y3MJHc-B-dJGiny4QYnL8k3CXP8yyY7s/pub?start=false&loop=false&delayms=3000
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2044
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2044 CREDAT:275457 /prefetch:2
      2⤵
        PID:2408

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      9cd0fcf3fa73eb65bd0bf76ab43aef97

      SHA1

      93afffabd7cff92f631b1bd57d6c9ff9e7d15c30

      SHA256

      c4e1b22508b6b863a15c9f7d7109aa0019bbe45027861c71b9c6244f7268a06a

      SHA512

      d5fdcaec50ba27e9ae4ae4ff8b2b25688b9ae58e76510d6ba9975459bb90f403908022f18c13d32df4a08466c395d46da90849605aaa6bbc72683602ba35d564