Analysis

  • max time kernel
    151s
  • max time network
    151s
  • platform
    windows10_x64
  • resource
    win10v191014
  • submitted
    13-02-2020 20:13

General

  • Target

    https://www.statnews.com/2020/02/11/priscilla-chan-charts-an-ambitious-unglamorous-course-to-fight-disease-her-husband-is-involved-too

  • Sample

    200213-aqp63fcjdn

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious use of WriteProcessMemory 3 IoCs
  • Suspicious use of SetWindowsHookEx 9 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 192 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://www.statnews.com/2020/02/11/priscilla-chan-charts-an-ambitious-unglamorous-course-to-fight-disease-her-husband-is-involved-too
    1⤵
    • Suspicious use of WriteProcessMemory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of FindShellTrayWindow
    • Checks whether UAC is enabled
    • Modifies Internet Explorer settings
    PID:4984
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4984 CREDAT:82945 /prefetch:2
      2⤵
      • Checks processor information in registry
      • Suspicious use of SetWindowsHookEx
      • Checks whether UAC is enabled
      • Modifies Internet Explorer settings
      • Modifies system certificate store
      PID:5084

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_D9817BD5013875AD517DA73475345203
  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EDC238BFF48A31D55A97E1E93892934B_C20E0DA2D0F89FE526E1490F4A2EE5AB
  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_D9817BD5013875AD517DA73475345203
  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EDC238BFF48A31D55A97E1E93892934B_C20E0DA2D0F89FE526E1490F4A2EE5AB
  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\SSQ26ICT.cookie
  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\UM3V9IE0.cookie
  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\X8N4N0MH.cookie
  • memory/5084-8-0x000000001E420000-0x000000001E5F0000-memory.dmp
    Filesize

    1.8MB