Resubmissions

04-05-2021 16:52

210504-l9prtg9dss 8

04-05-2021 15:05

210504-8hehzzn18x 1

Analysis

  • max time kernel
    123s
  • max time network
    143s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    04-05-2021 15:05

General

  • Target

    http://cando--china.net

  • Sample

    210504-8hehzzn18x

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 11 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http://cando--china.net
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:604
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:604 CREDAT:82945 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:4092

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    MD5

    10987a1d727697d22e9613985bf39eba

    SHA1

    d92fa559cdea14bdc068eb5388f4a8725d9d290c

    SHA256

    8c026af272e0d8eae1ec8978047926e4bbdb2a7ebe0207a738307150e2ed0063

    SHA512

    31910362ff1a6afe47a6abe7d77d1056eb1a1531cc027ae33bb34e1b4b788cd7efe2292278b02548e72b1441c86f85a3376ed46edf4c58a247febf4da91dfb87

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    MD5

    a03bb423eb7f6e4ce8f49fc38dc88272

    SHA1

    1b2440886e766d68780b26664255f795cd7e5132

    SHA256

    3f8f581536ddc0503d85f47d124c8fecfec5f9119f1b55c9d5a08be7149252e6

    SHA512

    d6266c2daf3f0ef4a62e3e4d7f3af7fa1ce1eaf8bacff866ce91df3cf6c6876ad271a2fb08700ab94f85c7e12cf8c6d675be2a2f90575625f80a2959e7fa9ec5

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\QE87DKKA.cookie
    MD5

    fe1ed68c0e9613f768a461f118ac4c7d

    SHA1

    c110b389a8ca0ea30baabd1de7036f94b970f948

    SHA256

    3bfd960ded416b6848313e5dcc9da06a315070b03d3cb83b2ff4b377b737140f

    SHA512

    f0c79549d681eb4766dfb2f1b884e5bf68f5abdfdb9514f5fd8b4981308146151ba543f30929ad49a5f9801d66c32bc279d404ac6e34acc29c60db463851c4c5

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\XTKXYPTZ.cookie
    MD5

    8eed7cbc934f6086ce5bddc0738391fb

    SHA1

    a8ffdb75b81eeec01085d6852ce868886c19b793

    SHA256

    76cda12ffc6635188726caff3293d12817376f30a6abb2fabe022bfe60aa1648

    SHA512

    f828c7dd9c586e929b80901593a441458bf9ab8e65b850ebf9a79df302537cbf2c05cf509d2c25059c652f0f50493f799f774a691985051d2ec8bde38c4776b0

  • memory/604-114-0x00007FF83FC90000-0x00007FF83FCFB000-memory.dmp
    Filesize

    428KB

  • memory/4092-115-0x0000000000000000-mapping.dmp