Resubmissions

21-11-2020 00:47

201121-ej5z3ev226 1

21-11-2020 00:42

201121-cdr1gwk9r2 1

Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    21-11-2020 00:47

General

  • Target

    https://sunriseerectors-my.sharepoint.com:443/:b:/p/kcummings/EUeNZ5mxjcJElml09XOedNoBfuqJQy2ruQ-BrFVgKkCzMQ?

  • Sample

    201121-ej5z3ev226

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 47 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://sunriseerectors-my.sharepoint.com:443/:b:/p/kcummings/EUeNZ5mxjcJElml09XOedNoBfuqJQy2ruQ-BrFVgKkCzMQ?
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2028
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2028 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1896

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_1DC6D7385EA816C957BA2B715AC5C442
    MD5

    bc94d23c9480a35facb5e50f2ab187ef

    SHA1

    7b677b8bc9704f369818ba9aaa86786c3735a602

    SHA256

    69e4bd5ed06087fbf1faaa02a868325de2da88a33516e285389de9ecfdb2543a

    SHA512

    40c607b9fbaae5ebf899b7b6bd90db649968526b91353e30ee32d28aa02107bf8b10eb1aa56e8859764c235227b2ded7b8b8f013ad72bcab86b7b52c3769675f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_1DC6D7385EA816C957BA2B715AC5C442
    MD5

    cce6ac5085b23a575361dc2320ee88b5

    SHA1

    2446f7db66f2d91ca6ecb7b9ed8b6706a967fd2f

    SHA256

    497ec2421511188a624eb4493fee5c3d7fc7457d8c0bf53518ec663c9cf0032b

    SHA512

    767738583be07a38ae7caf5e0b05fddb1ef6bd7804ba924989a1863dab47796ffacb23c649291d98b3cff34909b473905e5575d7ad2d8e730a4d577c258c9329

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    MD5

    2102949873d3bd3768bb1baea3359106

    SHA1

    28c3746f56e99a4bb19a764b095f07167ae9ea60

    SHA256

    daf08ee6bee202f2b03e4292211f9d198cc6f1e89f639539c685185a4c7f809f

    SHA512

    981a701bd46cc69b29111eda863e6cca8edd2ff74b29f842c9fc2b2eadd8ae700cf97c26020f8df1f2f45720573ae6d85f5d0b1482a3212c528f458bbee43180

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    MD5

    2c84856c549ff16caaf735c9886858a1

    SHA1

    8bc37d8adca89a203ad3bb086765520df8f03bf4

    SHA256

    5840ed450487d0e426ae28e1dcb8be492646d332bf029f103e7f3bf5adae6582

    SHA512

    f855018edc5c0dbf60a202d08d24acfad14bf2c481117f3aabcb4f90d1f84a3f11476a70c4205ed40c24bffb3427541d558b9221b72e6056ea5412e374a0f6fe

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\w5ukms8\imagestore.dat
    MD5

    356d0a99a33879f33b4ac3e74d8a0ec0

    SHA1

    01da2fd29b38f107670277d5d1dbbff96fc9aa85

    SHA256

    95716baf2413c16c6e576a4a180ad360786fc395ee6a69ee03d3ff2b1d752bca

    SHA512

    19ae58fd003f167e6a96527c38261f74eb5635bc5dc37ca3c3d9a83fc73ce75c5ef01fd29961d2f1a31b5aa4175f64cc43ee32ebcb4998fb878fb00f90f4bd37

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\IB6SNYF4.txt
    MD5

    d9ebb7bb71e304ca9a36c70d1a0c9e8f

    SHA1

    385dd0c95c577adb45c9b7c5527999e870d90f89

    SHA256

    0f4cd11203ddf6fa12da77546348216d1b20ca1ace3cd518e77aa7a0c896e890

    SHA512

    a2cdbf72dd933e5e2e53720345687a48ef963171be23563ff805f714ca61cdc112887bc22bf0fbbbef195fbdefad8c2d59a495e56f056b9aa0134cca15c8fc25

  • memory/1444-0-0x000007FEF77C0000-0x000007FEF7A3A000-memory.dmp
    Filesize

    2.5MB

  • memory/1896-1-0x0000000000000000-mapping.dmp