Resubmissions

11-06-2021 04:37

210611-g9m62eth5a 1

11-06-2021 03:24

210611-nwwtnpxkcj 1

Analysis

  • max time kernel
    127s
  • max time network
    142s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    11-06-2021 04:37

General

  • Target

    http://www.redcap.link/ghma8ndc

  • Sample

    210611-g9m62eth5a

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 52 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http://www.redcap.link/ghma8ndc
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3656
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3656 CREDAT:82945 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1256

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\5080DC7A65DB6A5960ECD874088F3328_862BA1770B2FEE013603D2FF9ABEAFDA
    MD5

    150dda2eb57bd8be69cfa5ce9cd3e441

    SHA1

    2298d1a63a477f66513803f3f3b07cf4252a4fc3

    SHA256

    90418cd3025b164625ff7d2ba42fa99cba396642cc600a9c100870d5d0e15749

    SHA512

    4042809184efa8279aa228f2b3c4e7b16b7f7546962e46852c9f48324e0a8d9e51a6ac9a64edf0367860f0f18d5f7da052455bd49e4a0cab4f0cfee0e3b3286b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    MD5

    6da3f673f86b0160bbc562da296b02e2

    SHA1

    4b580ddc267f73832140f32c43c645ed04cbb505

    SHA256

    cea2e743ec6800934ebab7a70c081652434cd3117d2cf0d80c370d224889a889

    SHA512

    3912f054306ba8d69453431644324c79e8846a3f1bed8d459b895cb9097197848a77b20a894540475157be47e5759097860a6d8fb65cee7ba7e3b8d07e4e7fd8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_2DBE917624E9880FE0C7C5570D56E691
    MD5

    54922379e617ff0afda858ec1c3c1c83

    SHA1

    9017f2ad1ac536a8c046db6e5f45762ed4c5c2b9

    SHA256

    5aa0c11160c2e9ed20bc38fa3738a81b27f277d6af1d617ab32a8a9340874c06

    SHA512

    0ba336eda38bcb0550ef31e22c262fd03c19b4847ac868951c238b748a7f69343a6820a524cb7650280b409d26c6094ed7b66f7df20947db3b10af5376a45b96

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\5080DC7A65DB6A5960ECD874088F3328_862BA1770B2FEE013603D2FF9ABEAFDA
    MD5

    526ea3d63ede6aafec7b6c11402314a9

    SHA1

    da701b5531a9e6ccb7745a7ca768330a2a7c5ea0

    SHA256

    68600290351b2fa7c1f594259d3b66620ec865de9dcd68ce46e8fc287913872e

    SHA512

    52982b45698639ca8295a4dafc6ca5ef8a55e034ddd49d73b4a458de15116c135b1e908c7e52de2d3902487df7e49e98402bd19c67a2943e75e7496da39c767f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    MD5

    8d19f698b61560b8b3b5a4ba49ebab60

    SHA1

    98208da6fc0a49fc20a9463db168c71edda412df

    SHA256

    a75bf8ae0c346c2d6a42f5ec207b0c4bf9a5fcc982570c5322c006d685239049

    SHA512

    5e19841ed410432ef1bb0a10dfe7c285c68759cd2fedfa726e79e8aac40fa3678b72bf2dcd3f5331c97632f5575cc9bf6a676a86ebc7034c093c8684f2815bc0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_2DBE917624E9880FE0C7C5570D56E691
    MD5

    b4794bd8f17fede43e93a2f0f2957f95

    SHA1

    c6d54583f6676622444351890062aa28664be725

    SHA256

    977487866593d68bd50020f9be180c953a2c87be762be78a889f5e4038cc5f67

    SHA512

    67ecf12947df1265c79a0c1c4d861bf83ddc426a02b07fa34e7cc958f9bf65d0a726fc419f2bbd4b2e97acec0ad87ab9aa4a909948bd486a10ba50aa6e2888b1

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\512FYUC8.cookie
    MD5

    e774d37733798ad7a1bbbe794741bff6

    SHA1

    1d95fb751059c818ad3bcfc7c6dcc67dd7117365

    SHA256

    08cd58549a39e7aea89fc40092ed234485e22151f1b74e659783fd324cda5f0e

    SHA512

    b5e3d4cfbb87163f9958aafe2852a6964659cead43f22d61da1a25494d691e4c3c33b0a5fcd461743d4dbe3b08a24fbb8a261f93a421d6867726731736f2a2ef

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\FEAIKWZ2.cookie
    MD5

    c6e3ca1765d32a3aa145f260df655bd8

    SHA1

    68eb9db61fe5b2b1b42bee378c19257f71a85a7f

    SHA256

    daa5943eb52e9fc1d081eefdebe0709dc290f33ff44ff0483ebccbbc817f7ce4

    SHA512

    053fa7b8d802ef93e6aff2215835acb669f52dd3857689c2b7866310e7d0b61d3a617c051553fa6028b2cdac88ce8786da6964b696778cf5ddf02747c07133e7

  • memory/1256-115-0x0000000000000000-mapping.dmp
  • memory/3656-114-0x00007FF891820000-0x00007FF89188B000-memory.dmp
    Filesize

    428KB