Resubmissions

11-06-2021 03:32

210611-eyexljxwg2 1

Analysis

  • max time kernel
    67s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    11-06-2021 03:32

General

  • Target

    https://tilerepublic.com.au/wp-content/uploads/2019/06/3_hexagon-mirror.jpg

  • Sample

    210611-eyexljxwg2

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 53 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://tilerepublic.com.au/wp-content/uploads/2019/06/3_hexagon-mirror.jpg
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1972
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1972 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1564

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
    MD5

    6045baccf49e1eba0e674945311a06e6

    SHA1

    379c6234849eecede26fad192c2ee59e0f0221cb

    SHA256

    65830a65cb913bee83258e4ac3e140faf131e7eb084d39f7020c7acc825b0a58

    SHA512

    da32af6a730884e73956e4eb6bff61a1326b3ef8ba0a213b5b4aad6de4fbd471b3550b6ac2110f1d0b2091e33c70d44e498f897376f8e1998b1d2afac789abeb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    MD5

    739567ed1ffecce1d1b8294d6e3eef15

    SHA1

    9b8d564fe5c458024d58134111c58e6bbadff334

    SHA256

    06c3cf27c15acb49f08f571a9111cb03c46a4c9088ddb60dfc0706e8a09f0375

    SHA512

    210609929cdbabd37b591555918a3595f54e502b73931f322e778a3148a93f037d0db5e75a8f229c857af69027c9f68237fd3611af170a79fc5d78178944b340

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\6BXQG974.txt
    MD5

    e98cb6eba9dd878a9c90c7f7c490d515

    SHA1

    919283718a1090cabf1ce2f97b62a9edf96b229a

    SHA256

    fb06d276a346e061262f9c2105143fed8d9b0a4fa7a8498f63705834822cd10a

    SHA512

    2195eac2093be41da838bec6ca0a39b48275c2c8f79a7e4a7a863c6a030c6c7c7cb553233fe64db1caf69dcebbc57c0b05ab9971057240bd3f975ba787018134

  • memory/1564-62-0x0000000000000000-mapping.dmp
  • memory/1972-60-0x000007FEFC381000-0x000007FEFC383000-memory.dmp
    Filesize

    8KB

  • memory/1972-61-0x0000000001F30000-0x0000000001F40000-memory.dmp
    Filesize

    64KB