Analysis

  • max time kernel
    68s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    13-01-2021 07:07

General

  • Target

    https://serviziamministrativi-infocert.enel.com/terms/9a43fc658f29e20331c80f9796fbff52bc39ea71beb6023c9371f1d065cd0efc

  • Sample

    210113-pct83wp81s

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://serviziamministrativi-infocert.enel.com/terms/9a43fc658f29e20331c80f9796fbff52bc39ea71beb6023c9371f1d065cd0efc
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1656
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1656 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1944

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    MD5

    bd01d3791d9c9ed4d27f448cc5e6e556

    SHA1

    3648c640f42267b6379cb23a5c03c986225d6105

    SHA256

    ff79adc68ffa195f1e46bea7a57037f21db3330feed65ef8670cb08de8c782cd

    SHA512

    a4903eefaaf93e559635126904510839f2f8bfc8a5bae467387335b9f31432004801f9ea2446bea07ec9c7f8e019262f16d4fe32b2c532d291bd7c68446ea354

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\7HIG5DFL.txt

    MD5

    1ab3879956e8de5b3374e13a97ab5e14

    SHA1

    75133cf0503082e06b4dcf761d1709b26d1fdf84

    SHA256

    c18d1a059fa923c5a3e0a895e474f78e409f49424b96d4ea2c268c5b61b325a7

    SHA512

    4622c69c2b9c06e4a96aaab6673e0afec18e248a543053ee997f5190dcb534cf25cdffc2d410d82df5477312532eb41c2f1674f4006109c684e82fec4b21709a

  • memory/1236-2-0x000007FEF6F80000-0x000007FEF71FA000-memory.dmp

    Filesize

    2.5MB

  • memory/1944-3-0x0000000000000000-mapping.dmp