Analysis

  • max time kernel
    99s
  • max time network
    126s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    21-06-2021 00:12

General

  • Target

    http://bucctoqokjxqrrbrkews.cementeriodelinares.cl//immtb2gy.#aHR0cDovL21raW5nLnNpL21zaS91d2dhbDVqMndzcy8jY2hyaXMuZ2FybmVyQGNhc2EuZ292LmF1

  • Sample

    210621-5dv325yeh2

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http://bucctoqokjxqrrbrkews.cementeriodelinares.cl//immtb2gy.#aHR0cDovL21raW5nLnNpL21zaS91d2dhbDVqMndzcy8jY2hyaXMuZ2FybmVyQGNhc2EuZ292LmF1
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1852
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1852 CREDAT:82945 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2020

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    MD5

    a64e2d26dd6f37ed569251d6dfc524ca

    SHA1

    8133be8cb0509b8e3ed907715e8df1785c555c6e

    SHA256

    4ca0b012928887c383bce5a4a38f87e85ff1fc9720b0f5ad0aec0bec982e3cdc

    SHA512

    a00f8a5ea363e36f56a309becc2faa3ccbf1c5c32671da78338b526d634b0f4c074d44a69280f5d6b629ec050a87950b1236ed7c2650abc1d26b9cdbd3cfbfdd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    MD5

    62d3cf45d5faada9f45ed23e78a5b068

    SHA1

    7d71eaaaefce5b75e6aca7c7173424c14c409e98

    SHA256

    8065a142a111d505aefcfb676c7fe63294e43200c5f02dd86ebfc079ca6f6426

    SHA512

    7e8427838b5162748245d91e925f3e3232724a6c3ef55b0a4b4d31dd2183e9fbbddbc9e43160bf4eaf635f70202c51c148411d2ee16fcb0418c1cdfaed6229c5

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\RCXPKQ77.cookie
    MD5

    1a3d733ab93ac6bd3fa602677bfc0a27

    SHA1

    0fe84564f6d2aa0b7565f5b9c964bbc9a7cf6a7b

    SHA256

    ee1aea4ab231b413991648b762afbe403af487e53c0908ff4ac51695d50ca635

    SHA512

    b3861238204d70b5926eabd009f41119d6ffc1cd88ca41579a865c944324b5d93c1b02df2c63b689b5a875047e63fcb1afff94d378752d62647db612bd66d48e

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\VHRBAIGW.cookie
    MD5

    32833aea61da113739fc52a941a1c21e

    SHA1

    80ca916f324accb4b3b484957544183d111fa738

    SHA256

    2e19a36a33b9bf76936dea0c3a94014b8d4b85b7283867b7f5e51a6bdb4807f6

    SHA512

    22b2251be89ebd57d866a3998ad39041818c5cfd43fed854675fc52c77410a5a05f506f20f924cd3c19631f6cbdcf1f8a26c026bbfa81aa38c1d8180fd6657f6

  • memory/1852-114-0x00007FF9D8B00000-0x00007FF9D8B6B000-memory.dmp
    Filesize

    428KB

  • memory/2020-115-0x0000000000000000-mapping.dmp