Analysis

  • max time kernel
    1161s
  • max time network
    1223s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    21-07-2021 16:14

General

  • Target

    https://www.digistore24.com/redir/349539/maelovely

  • Sample

    210721-rkvwz6gly2

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 61 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://www.digistore24.com/redir/349539/maelovely
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1208
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1208 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:1828
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x4e8
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:820

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    MD5

    2902de11e30dcc620b184e3bb0f0c1cb

    SHA1

    5d11d14a2558801a2688dc2d6dfad39ac294f222

    SHA256

    e6a7f1f8810e46a736e80ee5ac6187690f28f4d5d35d130d410e20084b2c1544

    SHA512

    efd415cde25b827ac2a7ca4d6486ce3a43cdcc1c31d3a94fd7944681aa3e83a4966625bf2e6770581c4b59d05e35ff9318d9adaddade9070f131076892af2fa0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    MD5

    503b55789d8e096626c0e2a07c1de960

    SHA1

    04b2f8b1fc35ca07c5ab67848c3d3255f52e0795

    SHA256

    fc646709f2bb8dc8bc9494621fea6f4e4e1ad27a359c9a91d9135e02216840a8

    SHA512

    e418b6255730954b88f565b8d3a3c19e4705ae70393987b497142ab50c554ff035fb27e374b06ed46bf80c992b9f039de428a106c1888b9d3d97395009ff5739

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    MD5

    f0967248530d019af5e71328c66151cb

    SHA1

    b2ea2fc674da99e90de1e8c26097609010f1fca0

    SHA256

    024d5b8654718d91312e7b0c737fd2a0bfd996729e7286ffe9b8d94095f6e0d4

    SHA512

    7edcfb393eef9c4c62ed20a1f958f6007ae10110d0afb78f9e2f652177f4782ec342936236f006110882d352f067f9e38692fd9080f70d1000b33ac18bc3caf2

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\GQHVBQT2.txt

    MD5

    cca27b0b435c6da8984baa590f0fa426

    SHA1

    6a29537d7719a213e41b24f76a3f35d37e3a0083

    SHA256

    4729fb7f427301c1867bd9115c36e7cbe7856c2db9d3a8b2123aeddaa0d9dd4e

    SHA512

    a23b74775b593fdcec85f7a107ef33b04709b2464e3836c68ce218ef5359feb41694b183806c50750821b27341c0c70260ca0d39173af30f8e00c1657a57f9a2

  • memory/1208-60-0x000007FEFC141000-0x000007FEFC143000-memory.dmp

    Filesize

    8KB

  • memory/1828-61-0x0000000000000000-mapping.dmp

  • memory/1828-62-0x0000000076281000-0x0000000076283000-memory.dmp

    Filesize

    8KB

  • memory/1828-63-0x0000000000E80000-0x0000000000E82000-memory.dmp

    Filesize

    8KB