Analysis

  • max time kernel
    137s
  • max time network
    143s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    21-07-2021 17:51

General

  • Target

    http://64.227.54.184/chrome-21july-2020/index.html

  • Sample

    210721-hrbep26jmx

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 47 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http://64.227.54.184/chrome-21july-2020/index.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4056
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4056 CREDAT:82945 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1760

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    MD5

    4e64ee3a1f4c34f528e8de9b728dbca6

    SHA1

    9b27bb889cc2fe2fbb89c0c7c8aa16a841291499

    SHA256

    ec75d601fb9309c65a60ad6bd10b10c5927c77648d42de670003dc0b2693105b

    SHA512

    e23b06910c9009d254dba06b1fe8910d10fd0c11cf0ad22ebf21cf41765da0f51f9179eeb39ca7317cf3ccfcce01622914171ebb9e7c661373dbc92acf9676bf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    MD5

    10fc38dd4ad9813d8eb8ced85d63c20f

    SHA1

    89556d85db0d4ddba266c553fd02fa01ccbd4f95

    SHA256

    74c63ce2ca29d9c976326d1f5a6d822cea9e2683cf1e0796ff432e713b9475c1

    SHA512

    e828e4187249c464119d440d8d4df936bdbfd8178e12fdc436be5c967a48194a0b779c1616dd9e489612cf5d6d6fc665f296c3f350dffefc027bf91c3026e2f8

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\G3XU1HH1.cookie

    MD5

    1ae26d033d80d536691b50f30d1984d4

    SHA1

    41a8c264a9cdac8e7fde78e2a24b34dfedb9e459

    SHA256

    e1a54177cb218bd0c3a0cfa6d4b3cfc1cc81f2615a4a510fc81f1be2e6eeaba5

    SHA512

    ff1542fcdc3e2ed7e3d8ac5582c49dfd4430a1a28e4fa1bd7d2a4717f924f3b6835bb61de4863ab0e9aad7b2323229442576ba92aa246c433004cd812cbf2187

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\HSJCAONO.cookie

    MD5

    29ebc91acb7d18d4141588d3c1e8acf9

    SHA1

    30eb8c9ffdbc6b6759fb14ae66e50b2a5ee47197

    SHA256

    20556b4eccf7d203411f78b17cbc89f852f5c2465a4b80465e5b45b53c6e924a

    SHA512

    c1bf873e7ba114cbd3edfe230795d32b650f9bef15ec8c7870caa01e4146ccd8af7f825058464aa7162b0cde74b9ecad1bd002a01cc6d981ce7269910b2e9714

  • memory/1760-115-0x0000000000000000-mapping.dmp

  • memory/4056-114-0x00007FF858DA0000-0x00007FF858E0B000-memory.dmp

    Filesize

    428KB