Analysis

  • max time kernel
    71s
  • max time network
    154s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    21-07-2021 22:02

General

  • Target

    https://cm.assurancesoftware.com/reportviewer/workflow?reportId=5E6DD15D-BB07-40A7-9DF0-F53FA95EB1C2&customerId=montana

  • Sample

    210721-xtfy1e69vs

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 60 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 18 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://cm.assurancesoftware.com/reportviewer/workflow?reportId=5E6DD15D-BB07-40A7-9DF0-F53FA95EB1C2&customerId=montana
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3492
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3492 CREDAT:82945 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1744

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\21EC5D29A48EB450C4E7692D6071DC54_98069108E4AB118D1EE93ECEB2127238
    MD5

    b7fed9e4aeab819b9a70f6e69cfcefda

    SHA1

    501d961927ccb2a294d4a4c61a019e658253878c

    SHA256

    e06bbd4f900efc225ea8335e37c6383c9ed07d2019f555c788d777b35f4af147

    SHA512

    d76772a3ae28efcc9230eb0cafdd3b31074c28ec9bfc268cccbae9e243597498301d1ee7e1b895103f56ef0e8b697034e03e7a7ffa97ab23ddfe1385b31eda16

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771
    MD5

    d1f5390c520d234450ef3804f1a4cbd1

    SHA1

    b2ee51361543c3e4ed724cd26043d7fe464e9a8c

    SHA256

    2c9c4f4c89cede69578d483cfdcd0ed159a61dd597d68b0ef7c1592723a4b862

    SHA512

    475c12e89a307b53e1fdcbb86363c7b16ac42148a9a6133a88c918abf5900aad2864c4c8fcc59afa2204ba7973524ee8e0238c9ae6914d5178e3d5313e7f5c50

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    MD5

    4e64ee3a1f4c34f528e8de9b728dbca6

    SHA1

    9b27bb889cc2fe2fbb89c0c7c8aa16a841291499

    SHA256

    ec75d601fb9309c65a60ad6bd10b10c5927c77648d42de670003dc0b2693105b

    SHA512

    e23b06910c9009d254dba06b1fe8910d10fd0c11cf0ad22ebf21cf41765da0f51f9179eeb39ca7317cf3ccfcce01622914171ebb9e7c661373dbc92acf9676bf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\21EC5D29A48EB450C4E7692D6071DC54_98069108E4AB118D1EE93ECEB2127238
    MD5

    3f4185a06c709f5ea762944388c27631

    SHA1

    4b820d2b212f1d673944dd8019f13fdf22226a4b

    SHA256

    7d685a3d1b4342c37eb216191dab65d738de82bb91d13a90eed87a7cc8b6c9f8

    SHA512

    388d23b828744adc79fb3198b1c886e994f2dd54292d7cd34e549f2587b6580f0ad527dc032687ceebaa6a9caeaad9a342365655ef225ab1d3323365ddc825e5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771
    MD5

    b78c27dc2d4bb15365196f6e49eb4cc0

    SHA1

    8671e9e9c428872ab1e422f7db26a3e6c5b74cd3

    SHA256

    12c6e987202bc7a8b78ce2012d67a8531bbee417a9b3e5966a03c88966a6c583

    SHA512

    d785ec8ecae54f74ef2db3f43d7acd3984c99c6c34cc60be1c87f7dc829388a48fa95551ce474cac04a35e19da7853c5ce55f9eaefdd666ef635d392228bd1a3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    MD5

    c2d93723ecddbda2098b1d22eb935e51

    SHA1

    0b73142bc0b0fa96909460d1479e57db683a290b

    SHA256

    d6c6e45aa50f71e5f1d0e81b2d74209884f277b5e295af659fcd2c927d819ad6

    SHA512

    7a994f6be8ae25852115066f7df15caeb9365b171ec1020a4a3840d5cbfe427a49a6ad0202c5bc669bd1dad99d610b397b6acc46a9d19d5762d4454a6271c502

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\T97K8Z0H.cookie
    MD5

    d1caed94eefd44ff8714fcd3e13a7a96

    SHA1

    809ebc9f0f0491b645ff177409447df0ee37d7e3

    SHA256

    2224857a86d6d0968cc24fa148b9201a20688f7a05ee66dfd1332b10700e172b

    SHA512

    0d6011ebc0f32cfdba167dfcc60bb885089be6a884deb65204dcecb5520f9ad6923806eaf0c70c6a114e6464d2ded09d5bbc08949b9d22a0446df2ee24fd5fbe

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\VF8TGFI8.cookie
    MD5

    9387f8fed5f8a1812098e09562cf4962

    SHA1

    dc2afa69740d8a7dbc9fe5f4b3c90329b0a107b6

    SHA256

    4ef2756ac37524a5c028cba9289b979bcf8dafb1a6f3dae92d65a5b85418d76d

    SHA512

    27f22d7dc303d6a5e95507441c1e4e469d224fdcceb242d2ddf59deb3ca0595173f4d2f8df2838a2d7a6297561ef4cb6838e9cba32e8b734d401e665563ece75

  • memory/1744-115-0x0000000000000000-mapping.dmp
  • memory/3492-114-0x00007FFA02C30000-0x00007FFA02C9B000-memory.dmp
    Filesize

    428KB