Analysis

  • max time kernel
    141s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    01-07-2021 05:48

General

  • Target

    https://exitmagall.xyz/iduew73

  • Sample

    210701-vjg5t6h6ma

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 50 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 22 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://exitmagall.xyz/iduew73
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:684
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:684 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1960
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:684 CREDAT:340994 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:856
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:684 CREDAT:472081 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:516
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:684 CREDAT:275500 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:968
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:684 CREDAT:537629 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1332

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    MD5

    4dcefe96654f86f39d76f047039706c6

    SHA1

    99ca4ef6f1d46f0d085fe6729ac276b1b88d9415

    SHA256

    793ea9de23b0835c1d182a77023e4c2cb45fe13417c16996ac21ac0cee62384c

    SHA512

    cd155058c273d43f49b732b3d68e8f51df5b9b99f7a5dbe82eb0822b7289fd31d3161b6191059486bafadaa227cb450ccd7198ad03b41d6ea960dba3328edd6a

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\D4X32ZLU\D0FS9ZK6.htm
    MD5

    21fa59d67e51e397f5bfad3e3e411f2d

    SHA1

    b66683c5f4d95c3268bf699bedade0e23c95c089

    SHA256

    e7885ef4822973d7f92aeb4f52590cb9ecd1489c9cb5bb592fed10cde8bd457a

    SHA512

    3794de81d127a77750ff5d13aa5e9b9ea9bdbaf85e4bd8517c053c7f20b082564f1718a8ce206451d95fab4dec8e8cf25f139bcaf906bd7311e49e92193810a2

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\D4X32ZLU\DS10SWA8.htm
    MD5

    a49c1febbfa92d7bb653506b8b69e4e8

    SHA1

    db04f919e98c363523f1ca0dc2cbcdc0ef515de3

    SHA256

    6041f380efa04fa2cd2d774529d27160038f24ec9500ad1e79f98c88d7f46e0b

    SHA512

    675361039643c084f6c96293f2599d493cb6277447cdbd546ae597f76af453daadbdac8db59f219364e8014878289e0b8449a86173a9bc92e4f9fe0e04e98404

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\RNQMQDEL\FH97WZ95.htm
    MD5

    24a669a032a16a8d9fc24bd4729ee9e7

    SHA1

    8b87be068fd09b35ea65b307e18c0e3af9ad61be

    SHA256

    4df7fe112b5cffdf651f93e740c75d3147fb44195dfdb77a427b92763666207d

    SHA512

    c6b45a25bd2629b4ec8386bfc857484ac499f18f2012e58e6a554f314f8a817937957226a5d7da69250b8866a0e7a76d26f1b17a5697872e58ce9182ebcb6c91

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\FT3XRUS4.txt
    MD5

    1e32a9db728f30ff8b44c4604b2d0e6c

    SHA1

    a07260c7f7133e7bd15faac562cfa2e3a1245412

    SHA256

    0efc0f8a498f66ba2b063f82f219a95107495a747a462c23dd1abbb4b81e56ba

    SHA512

    b00800a1d03d9764855f784dab6ae42c2b228dc21796b2f662e3f1d40117cee35260ba20e741d4a5c21c1255b10042d985469f46ec80aabbc55524fc3357d71f

  • memory/516-64-0x0000000000000000-mapping.dmp
  • memory/856-62-0x0000000000000000-mapping.dmp
  • memory/968-66-0x0000000000000000-mapping.dmp
  • memory/1332-68-0x0000000000000000-mapping.dmp
  • memory/1332-70-0x0000000000B40000-0x0000000000B42000-memory.dmp
    Filesize

    8KB

  • memory/1960-60-0x0000000000000000-mapping.dmp
  • memory/1960-61-0x0000000075C71000-0x0000000075C73000-memory.dmp
    Filesize

    8KB