Analysis

  • max time kernel
    93s
  • max time network
    141s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    20-11-2020 19:15

General

  • Target

    https://www.google.com/appserve/mkt/p/AD-FnEykFb2imDxLt32VDbOc2msZxjzEb_X6p-Yi8V GaA7FfEH7VCKYFhoLcLXtK465S-Z6nmmlizqXIc1U1kKun7PArD11u_cEQrxQilQ-k6KbrFWvB

  • Sample

    201120-qk258darys

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 52 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" "https://www.google.com/appserve/mkt/p/AD-FnEykFb2imDxLt32VDbOc2msZxjzEb_X6p-Yi8V GaA7FfEH7VCKYFhoLcLXtK465S-Z6nmmlizqXIc1U1kKun7PArD11u_cEQrxQilQ-k6KbrFWvB"
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3968
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3968 CREDAT:82945 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:908

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_D9817BD5013875AD517DA73475345203
    MD5

    86c870fa0e077109a2b3608a8334a07c

    SHA1

    607491bce4e1217c4dae1a11175a7dc6ba9e1200

    SHA256

    d7ae63a43df14462912cd0740c6fcf6601f0c862e77068bdcd8304e1d2c5a0f7

    SHA512

    f75273ddaa36a941a5a23f92f7d3ac1f3a8282d30a842e1edefbec2b4add27d563a3c9b8bb1be3df52419920478b0f45862dfe50162d1c5f7b7ba5334e574a6d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_D9817BD5013875AD517DA73475345203
    MD5

    b612d90ca9d7bfef6c37e65a7e35cc3b

    SHA1

    e22fb7bde2b507dd9719c4d435ccfd115d590b11

    SHA256

    6e734405c6b8e3e5b7998260de57833a7968d2b874d0acba2d7cd834011ffdea

    SHA512

    e7cb456a62c684e908abe34fbb6be260f87d18f6987fd324d075083aaa4e7cbc64789626a1e4748a86633d23576da07691ffc3678f93bca2d8bb73a8f030cd75

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\1LN4I9FC.cookie
    MD5

    3290f3197cb44b9ca9817a2d8d84a060

    SHA1

    84afd694f2fd739d2ae27207a1bdefb189291e5c

    SHA256

    3088e69ea4796ce78b69af1f66aedf602f9f5fd0d1c00a029661a7f052a1d2e4

    SHA512

    a32738d8c85bb1fa7dc11f02d16ffe4ab5d9217af6da9f9c5e63f76454b1834cb696f418604fc6ac3e158f2e6a5c7dc20bad7a5ee6e1f8c5bbed63f00dcebff8

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\ODXTH7CF.cookie
    MD5

    5700c4b5b1ff7ef34b2348e73d3d9dda

    SHA1

    8a39c4934903910f1a5ab5261fd7b6060a1e8ac2

    SHA256

    7bd8d755f9ed4f9bafbda084712a45cb3aa0a78d09cb735232b36452e6fa9fe8

    SHA512

    6d36a710f22acdde1af85a71d1c3ee41afd8ac3910d1fb628c2f33bc8f4853b5b6d4314fb3dcb24689ea2c576116ad0d01a339df41853150d8ded6a4295d7f3f

  • memory/908-0-0x0000000000000000-mapping.dmp