Resubmissions

21-11-2020 15:52

201121-kbl4lvdtp6 1

13-10-2020 19:34

201013-w9mpbraj7n 6

Analysis

  • max time kernel
    91s
  • max time network
    141s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    21-11-2020 15:52

General

  • Target

    http://www.mparrain10.duckdns.org

  • Sample

    201121-kbl4lvdtp6

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 47 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http://www.mparrain10.duckdns.org
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:980
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:980 CREDAT:82945 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:3416

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_D9817BD5013875AD517DA73475345203
    MD5

    4fd1154dbee8bda008d2a2ff53240855

    SHA1

    29913132808f93bb89583082786ca080b6609a1f

    SHA256

    f0643a2bc9668f5378bb84f7302b925073d18374648e1d33624c88c149b9370d

    SHA512

    62739cb9df68299ee11ebbbcded36a7cc821d8a3b08e1fa0e84969340338e904feb320079e0dc10a8cd3fce33ffbe21dff569333a801aa8edbf776fb4285b235

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_D9817BD5013875AD517DA73475345203
    MD5

    fa390ed557262f2b4a49467e612a8f9b

    SHA1

    9872eb3e394b8abf48446ae8a41d5dd960f3235b

    SHA256

    8829fff2547d7d2cdc049094de021971fdad3c75a88f47a8ff323af61301e3b1

    SHA512

    1479858000a7cdea5e7286e478b3caa6777788ad66393c299d058bf59305581e07c51caeb68accf19e6eda0991dd3054424cf9fbd5e40d261017f074ac7e4f47

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\J0JVM9XV.cookie
    MD5

    5149d2838f110f4043530c6a6d78d778

    SHA1

    42418955cd5ccd2a5589aeeef1f3d48b431d2a1b

    SHA256

    979bb6fe2fa0a9d5db4cf36af01f98500fead90165f1dc55b382eae2ead5663d

    SHA512

    0858df52920e50ccc299100da65ed95919eee2e7f30d62caf1490a18849da3b8ea49ae379083846a5d74122e02d294f7cda03d4b99f38f3927de4f6022fe6334

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\REB7PNIM.cookie
    MD5

    c10ea89d58a072992fd45f699a3202f6

    SHA1

    99441bc11f87f9014d0f39f5684ed6eb11765924

    SHA256

    a479780ca20606992039c770740be5ee823765c3a02dbeb40688ad75a386cfa6

    SHA512

    accd8337165202c63e64b00a18e3dad96838a655ae09ff2c677471018a96ec165ef3bd6063c3b96bd61f6ece2ede97dc573fdd2f95874a11140a4e79e5733d6c

  • memory/3416-0-0x0000000000000000-mapping.dmp