Analysis

  • max time kernel
    86s
  • max time network
    149s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    22-07-2021 08:43

General

  • Target

    https://www.felipebalestrin.com.br/wp-content/uploads/2021/mrzjjzucaekshyxo75ptcqgeagcnrtvjagdtgftxwkqbr22zo4b/krzqnuwrwmt6dq6utuyv4nhpzmscvcf3xf3wqimpr7myualswp/mtjxyz8sceaskanjcxre6pv37ucnzqgwpyaxgc4ajxfxyxdyzo.php?gebruikersnaam=ondernemersdesk@das.nl

  • Sample

    210722-1ppzvbh97x

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 9 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://www.felipebalestrin.com.br/wp-content/uploads/2021/mrzjjzucaekshyxo75ptcqgeagcnrtvjagdtgftxwkqbr22zo4b/krzqnuwrwmt6dq6utuyv4nhpzmscvcf3xf3wqimpr7myualswp/mtjxyz8sceaskanjcxre6pv37ucnzqgwpyaxgc4ajxfxyxdyzo.php?gebruikersnaam=ondernemersdesk@das.nl
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4092
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4092 CREDAT:82945 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1656

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751
    MD5

    0675c0d0da9a6eac284a10c2ddda636a

    SHA1

    6c7856ef6be6b6fce283423cf9d48e7d101d7fa7

    SHA256

    7852903b2b3bd59c816aa0a74272a4c51bae13f38bb72a67f3fd04b50d061b50

    SHA512

    09a3f652bd943a7cc3def436c9fe769bf5c30499b78d63598fc2fc23fa15932a08d545354129fc346133efbda456edfe8d4a10bab5a50abe7d132c2228815232

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\1E7E1BE729610F7D7261C865BDE45C35
    MD5

    c3d347c15c3d98025b172833f7cf3fc2

    SHA1

    e19041ca19a40aba5265cf6afb02fbacb0128a9b

    SHA256

    c77e71d02f630f5f94b11595191ee8c5861f7786af8d79a94ac9e4ee385b4cbc

    SHA512

    6353a6e2be50a2232c66a8261870585abc3b37d0dff973a487dc4e2a9ec16729058836f0d45105113d8d21c48297eb614452e92d8391dc0cc8673683ea2fbe16

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\644B8874112055B5E195ECB0E8F243A4
    MD5

    d33394b86db2d590028ae542551b5a67

    SHA1

    200fac7cc75d4da652d0918a6fcbae6f7ca2c5a3

    SHA256

    4d5ff3d32db0d6e78c27f1de69f614c507a0928d24f1de79360cea58096b3859

    SHA512

    114ceb2a930baeb652710387734691cf9d56d2f60d1db94d9095151b1f537b7c89f504c96f4591e863c0c218ad200485e97e77c06ebd4e60c33958ce24acf167

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    MD5

    4e64ee3a1f4c34f528e8de9b728dbca6

    SHA1

    9b27bb889cc2fe2fbb89c0c7c8aa16a841291499

    SHA256

    ec75d601fb9309c65a60ad6bd10b10c5927c77648d42de670003dc0b2693105b

    SHA512

    e23b06910c9009d254dba06b1fe8910d10fd0c11cf0ad22ebf21cf41765da0f51f9179eeb39ca7317cf3ccfcce01622914171ebb9e7c661373dbc92acf9676bf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751
    MD5

    3f90ea923df8fd4b323e5c73e12241b2

    SHA1

    96f6d26c1736f3108b16e46afdbec064cee8426f

    SHA256

    3fa610ab3e6039fef4ef9ab21ac8c46da7a03e8ddeca7c22e19433933a625cf4

    SHA512

    db1e55c32e5303ac688e330dc7fe6e1178a1cd13c0a33cb522bbe4c3339fb547ff4999ded30fa5c64b50a68bb1c871df46689bf1de9f8eebe76aca3f8d961ac4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\1E7E1BE729610F7D7261C865BDE45C35
    MD5

    9ea51a45b45cbd7522893de9b321ed4f

    SHA1

    8830c05166a5334b65d8e5374074f69d045cdcc6

    SHA256

    008f94327e95f579a53f613f9f563da5156ab5b7410689449296d3b7e6cf04c2

    SHA512

    bf351d6af04d803ed6c5e06549444bcbd2c460bff11bfc2b6478823b5501ee78a0a2c192ca2197dce852560f2d83a8e4aa2890cf91bf16736998dab8e2fba68c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\644B8874112055B5E195ECB0E8F243A4
    MD5

    4acee9495772f973600013d7f9b1a8f2

    SHA1

    8c59f56a3c49f4aade4cdaa7d28eb98e3fcbda03

    SHA256

    6226af809bca31f1436709be460ae10eba434c101399f3d44b5a43c126b589e6

    SHA512

    f6c068dd1eb12b3aba2572bf2297775dedcc8a1e7eea25e42e56f83c8b51546a771e66e0df73a33876953d940406457c1a7cdb86aeda13635a194c9da6fb8695

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    MD5

    58be4eaa859698904d632bcc3541e50f

    SHA1

    d407ec79e64cfc6a3e0e597514425b44184f11fb

    SHA256

    82ed712cf5b015ff2e19381ded98421b9d348d31168d645bee34bdeeacb81ac3

    SHA512

    632748406ad2a6c9ca70f3ca27932e9dc043cbaad86d19813af4ed4e5386d3a98d6f461240b220450facaee84165009f051b67dd3f9508e156f634e43d232087

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\5YG5W0T8.cookie
    MD5

    ca827ec931afd598f866da9d51505f35

    SHA1

    dc192573397aa0122f7e6536fc2db07fd26128ee

    SHA256

    adc80bb345f923578f35fbac7c459cf7a7571373409d4e8b4821e149e5db7279

    SHA512

    b7e7907cdcd5cc06ba15b34fc63c28ed43c4036544c43f4126f89ea60dcfcbb7ab635010f543ede7f0be235a9b56864d100fdb217f9c41872ea1206b0325a33c

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\VFGNANNK.cookie
    MD5

    441e5a424e7f8bcd3474d462adc5e386

    SHA1

    96355cc518dcfa3c5eaa22f16ae3451163320a57

    SHA256

    66ca40c52234026215c02b1d9eb8b5ad8ef843c209926bac99028d1f4624be18

    SHA512

    f0279bbaf3eb7fccbb34eabf07f4e0117457c15a9dc063e028a8509fbe8b95def4e1ff633daa3fe1c3a0ebbd753ce323ca000e563bd47f6d4703912ef2c952f2

  • memory/1656-115-0x0000000000000000-mapping.dmp
  • memory/4092-114-0x00007FFBC1C00000-0x00007FFBC1C6B000-memory.dmp
    Filesize

    428KB