Analysis

  • max time kernel
    85s
  • max time network
    133s
  • platform
    windows10_x64
  • resource
    win10
  • submitted
    09/07/2020, 05:02

General

  • Target

    https://urldefense.com/v3/__http:/url4659.orders.vanillagift.com/ls/click?upn=U2P5Ajr08VYowHG6FTmJsBG-2BZNcUFYVeU4ubXsSvsZBD5uYN1I7cJjk-2BzOYa0TCJrlt-2BdCID9sslm52hQsPsHSlZb6anUp-2Fl5KLeGmpLdqv2FOiO0V6Pgj1dKP4VxkqZg4JwLu0IpxMc2eXhClaSzGuNLwM9Wh99FGposINg1N6kxau5RGhxqo0-2BGpnHkCOkx7VqpaNoLFjJwfmCzZI2IHPxiYtqHjYuCqjx5LsIbVfsSxBTYAJJ3VsMkXfsU5hhb1oZelOboFxXjV1l7YfELo-2BrKg6iICrskQ6WPhE71NG6J3JWOsb2PkAmLj3Hq1UwfYZDzmqy-2BCmiaotWOxOfEs9-2B1IxDtQmyv0bPjXMecZO8sO7AqrT3IJ2ECku-2F-2Br2mrDXpsFENQDvubssQT9vM7Q-3D-3DiSLx_4YxLfO8DUrvqQuyPn0EwSS-2FMCG0PInXfxq9Hgt0jwWg1Nb2zrSki-2FetkLEJMeAGJzm2gqDF24XOHzasaWwhZM1X9Gr-2BR-2FP5L9ZAwcKp7NjrxqPV6BTjZTaKj2ylYUULPvtpb-2BFdN6q0EOCOXKPQo56TSZGhlj7A-2FZ0d3KpY5CQLO7ZKsKUkPn3-2FtD-2BZaFmhbU3vqLialbElM-2F79BFmXMVyqyWyqFvM759Or2zUN7R0-2FK9-2F7kFayhLsj-2BAt-2F-2Fr6qFfwG-2Ben-2Bs94cgLiFvAOeRRw-3D-3D__;!!KOmnBZxC8_2BBQ!g0iB8LeZFpnNeOH-p03gy20hL6H8mUgymC0eZuivCFGPFWMajPC8FlDPzcSjwsTDOw$

  • Sample

    200709-dbv1rak9pa

Score
1/10

Malware Config

Signatures

  • Checks whether UAC is enabled 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 129 IoCs
  • Modifies system certificate store 14 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious use of WriteProcessMemory 3 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://urldefense.com/v3/__http:/url4659.orders.vanillagift.com/ls/click?upn=U2P5Ajr08VYowHG6FTmJsBG-2BZNcUFYVeU4ubXsSvsZBD5uYN1I7cJjk-2BzOYa0TCJrlt-2BdCID9sslm52hQsPsHSlZb6anUp-2Fl5KLeGmpLdqv2FOiO0V6Pgj1dKP4VxkqZg4JwLu0IpxMc2eXhClaSzGuNLwM9Wh99FGposINg1N6kxau5RGhxqo0-2BGpnHkCOkx7VqpaNoLFjJwfmCzZI2IHPxiYtqHjYuCqjx5LsIbVfsSxBTYAJJ3VsMkXfsU5hhb1oZelOboFxXjV1l7YfELo-2BrKg6iICrskQ6WPhE71NG6J3JWOsb2PkAmLj3Hq1UwfYZDzmqy-2BCmiaotWOxOfEs9-2B1IxDtQmyv0bPjXMecZO8sO7AqrT3IJ2ECku-2F-2Br2mrDXpsFENQDvubssQT9vM7Q-3D-3DiSLx_4YxLfO8DUrvqQuyPn0EwSS-2FMCG0PInXfxq9Hgt0jwWg1Nb2zrSki-2FetkLEJMeAGJzm2gqDF24XOHzasaWwhZM1X9Gr-2BR-2FP5L9ZAwcKp7NjrxqPV6BTjZTaKj2ylYUULPvtpb-2BFdN6q0EOCOXKPQo56TSZGhlj7A-2FZ0d3KpY5CQLO7ZKsKUkPn3-2FtD-2BZaFmhbU3vqLialbElM-2F79BFmXMVyqyWyqFvM759Or2zUN7R0-2FK9-2F7kFayhLsj-2BAt-2F-2Fr6qFfwG-2Ben-2Bs94cgLiFvAOeRRw-3D-3D__;!!KOmnBZxC8_2BBQ!g0iB8LeZFpnNeOH-p03gy20hL6H8mUgymC0eZuivCFGPFWMajPC8FlDPzcSjwsTDOw$
    1⤵
    • Checks whether UAC is enabled
    • Modifies Internet Explorer settings
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of FindShellTrayWindow
    PID:3692
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3692 CREDAT:82945 /prefetch:2
      2⤵
      • Checks whether UAC is enabled
      • Modifies Internet Explorer settings
      • Modifies system certificate store
      • Checks processor information in registry
      • Suspicious use of SetWindowsHookEx
      PID:3840

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads