Analysis

  • max time kernel
    92s
  • max time network
    141s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    14-01-2021 12:51

General

  • Target

    http://url9966.communitychristian.org/ls/click?upn=rJAiD0atp2sVWwUFmf6UUa-2F-2F22YK-2BZJcRzS3Ulg02FTRA8spAQJ74nhYLWXnqJyZHpk0PsnxrRz-2F4OmOIj9WdKpRopHSDJEByVknOFzTLAeURQKq70ylAsM1zFbjzG98HTfF_RRiReq3CU2dpnrz7O9NSgvs38a37iD1mMdgQXyXAOenj-2BBdbuMGYKtbKsIse-2Bs5u3OhrL7fFG8xeBSgCCyjIQ0PQ-2FG2ihVg5Wvzdo0TZoTaaG-2BHcTY7n1FHP-2FQsRcXG6RZ1bCzjO-2FUi0TjpsINXvdqfjYvR-2BamGx4lB-2Fyq-2F7tQWD58SdRDH6U7tvSXOoldlQggVc55Qqw0ueqYJr5nC-2FfY0I2neMm-2F4UZ4UGuZpW5F0-3D

  • Sample

    210114-tsnxnhgs86

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 47 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http://url9966.communitychristian.org/ls/click?upn=rJAiD0atp2sVWwUFmf6UUa-2F-2F22YK-2BZJcRzS3Ulg02FTRA8spAQJ74nhYLWXnqJyZHpk0PsnxrRz-2F4OmOIj9WdKpRopHSDJEByVknOFzTLAeURQKq70ylAsM1zFbjzG98HTfF_RRiReq3CU2dpnrz7O9NSgvs38a37iD1mMdgQXyXAOenj-2BBdbuMGYKtbKsIse-2Bs5u3OhrL7fFG8xeBSgCCyjIQ0PQ-2FG2ihVg5Wvzdo0TZoTaaG-2BHcTY7n1FHP-2FQsRcXG6RZ1bCzjO-2FUi0TjpsINXvdqfjYvR-2BamGx4lB-2Fyq-2F7tQWD58SdRDH6U7tvSXOoldlQggVc55Qqw0ueqYJr5nC-2FfY0I2neMm-2F4UZ4UGuZpW5F0-3D
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:828
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:828 CREDAT:82945 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:4044

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    MD5

    1c719258028a30f4c5c4b9927bca78b5

    SHA1

    74876832f8b66db34beda49067d1cdcb54a809f8

    SHA256

    c6a5befebb221e5937f4985c5aee4897942e9469ab7e93a11b7d05c33cfc57a5

    SHA512

    0c2059b78f00f5dbac85f91e6661734e9de9726948edbaf1ce1224a3156203072c40f61e00c0c5bbb5cab937e7026e4e90446e941e2d504ebcf9b877ab28e493

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    MD5

    3d41c8c7faa1716f96c39c85b3617186

    SHA1

    b253a6cd9e163fe075698b7bfb7d5aaed24b49af

    SHA256

    c2f910746f3327c34e11b333627d4e7daa4a89de96890bdfca9bd7dda0da5cc2

    SHA512

    2684bf55ea9c76d111ea8d1297577ee7e9dbd34b33c5ccf4ec8f19c57d743be61fd5e27e85ee4d98ab6d93136fb0abe0d552801caaeb6ab460de3c23bc070e6b

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\ZRPGKTNT.cookie
    MD5

    10c037f346cf06c3aa6dc72fb97c0494

    SHA1

    5ea994707bfba246950bcb579aeb56ea77b8bcd9

    SHA256

    45081f4a8ad68481b684a8a85d8f189e57339c269998f8be1c318a5a6e0f769e

    SHA512

    ec1781c29e4c45c30d7b8c6dd20526037c4876b2b05b68654c39a86008dc21aff41390f7c1bf4ea6bf7259a9e02563387c0aca56c0aa34d24e05c129724898b2

  • memory/4044-2-0x0000000000000000-mapping.dmp