Analysis

  • max time kernel
    131s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    20-11-2020 20:31

General

  • Target

    https://secure-web.cisco.com/12P1Qcuzq1pIKjXJe7oiu03tMS3Z-cSKGyRe_g9v5Jpm5kHCFN9-TOiDjtZmG0VlZG4HYYndh_sv3JmPsftHegYUlG1bDhLUJFBD7N8qzRfBirLnvooC2-SMpa1HbbelWUA6mFCMz2HxDeFB23zhhbL5RVQAHfusgFfDEHQN1Tn1CXv3sjUzMTSi0i9rHM9KSxr-1FBUjFcp3W2JfcTCn-DJT_5dTs_4Jl7s1bvNXOOz1tBU3tmCOucmHnrhF44YNMlJ0WWzeVfcrJe0Q6AQXz8m3RxaMhtQHJ_eE4Ng06snLnFspPPWrZd6tzMWlIjSbsVZ9p98vTVSW04CobpIwCQ/https%3A%2F%2Fwww.contactcenterworld.com%2Fmessage-center.aspx%3Fnm%3D9754380%26tk%3Dh96d18a18

  • Sample

    201120-74e6rq5e7n

Score
6/10

Malware Config

Signatures

  • JavaScript code in executable 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 56 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://secure-web.cisco.com/12P1Qcuzq1pIKjXJe7oiu03tMS3Z-cSKGyRe_g9v5Jpm5kHCFN9-TOiDjtZmG0VlZG4HYYndh_sv3JmPsftHegYUlG1bDhLUJFBD7N8qzRfBirLnvooC2-SMpa1HbbelWUA6mFCMz2HxDeFB23zhhbL5RVQAHfusgFfDEHQN1Tn1CXv3sjUzMTSi0i9rHM9KSxr-1FBUjFcp3W2JfcTCn-DJT_5dTs_4Jl7s1bvNXOOz1tBU3tmCOucmHnrhF44YNMlJ0WWzeVfcrJe0Q6AQXz8m3RxaMhtQHJ_eE4Ng06snLnFspPPWrZd6tzMWlIjSbsVZ9p98vTVSW04CobpIwCQ/https%3A%2F%2Fwww.contactcenterworld.com%2Fmessage-center.aspx%3Fnm%3D9754380%26tk%3Dh96d18a18
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:292
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:292 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1780

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    MD5

    bda433eaf3ae4755977c4bcbffa8a2d7

    SHA1

    2938c392a0e99476108def141898ecdc39dbbd4a

    SHA256

    9696202287b30e31875a40f51ffe4257b08f52f6abdad71fb1bc39147214a01d

    SHA512

    3d2333a7b008bebb3ba07c1c07ea2ed60765fea0ccbc85d10f13f3a4b1f44263a56356ee0af3a51638b86d3d975a4be7fd7f8e9389075c23cbb473daf0b5c580

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\w5ukms8\imagestore.dat
    MD5

    d59e820f888eb4c5b867d1bda811076b

    SHA1

    742417df4bfa9d3a5cfd1220b8a1f6569a700ab0

    SHA256

    5edfbc02fd7d2a06bc63ca78ce628a1313a000ece396921f0c4a4d8761b65271

    SHA512

    3bb64c02298b23557fab1fc56d2f207850c5bc27f60ceaba67435e9e94d739c929b94d79fbc0ce647ec7a11eb4b2d427fab2d3cbd33e1ed736b56b9c045a4d0e

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\BMVQ5B7W.txt
    MD5

    8437ded2adcb79d28df5734c18d0cf1a

    SHA1

    d9ab35ecafe8e66b92073397fea727a5cbf3a7a4

    SHA256

    f6b1f41685ccb65fbdf796fb22c896b28db9eadcefc9990dccbc3137e3ad2bd2

    SHA512

    df6c96c50950957d5b7f5490e8057b15e7329b895298f3ee80628b5d5b84c9ea4c3579915c198c1c249999b78f053a2d955d9cfb0d52c4e873cd533ed022e62f

  • memory/1164-0-0x000007FEF63E0000-0x000007FEF665A000-memory.dmp
    Filesize

    2.5MB

  • memory/1780-1-0x0000000000000000-mapping.dmp
  • memory/1780-17-0x000000007EF00000-0x000000007EF10000-memory.dmp
    Filesize

    64KB

  • memory/1780-26-0x000000007EEF0000-0x000000007EF00000-memory.dmp
    Filesize

    64KB