Analysis

  • max time kernel
    92s
  • max time network
    150s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    22-07-2021 08:20

General

  • Target

    https://crm.onlineshoppingindex.info

  • Sample

    210722-9jx5g7ewa2

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 47 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://crm.onlineshoppingindex.info
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:568
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:568 CREDAT:82945 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1928

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    MD5

    4e64ee3a1f4c34f528e8de9b728dbca6

    SHA1

    9b27bb889cc2fe2fbb89c0c7c8aa16a841291499

    SHA256

    ec75d601fb9309c65a60ad6bd10b10c5927c77648d42de670003dc0b2693105b

    SHA512

    e23b06910c9009d254dba06b1fe8910d10fd0c11cf0ad22ebf21cf41765da0f51f9179eeb39ca7317cf3ccfcce01622914171ebb9e7c661373dbc92acf9676bf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    MD5

    51fc834d3d728db3849f7de92f2abb8c

    SHA1

    2f560f2d82a271c657aa43525ff64014223e0cf4

    SHA256

    355955d1bef8db856f2d834c8f64bd821c830310a222544196bf0b6dccbc3ad5

    SHA512

    5ad2b31d9de6ed3ad5fdbd8c662f5b5e9547f1ae8c705031bbafccd8e230ba32aafd98b37f513fb265a20f8293523949dfc1ef1a2dc0e1c34b8897a7edabfc6a

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\J30SQAFE.cookie
    MD5

    f4d2c8c4691cb2a00559b69ba9080a59

    SHA1

    25b43d7d5ea01b1a0bb2fcffb667de3b06982fcf

    SHA256

    33e1a09a2c8d152982d2166bf731833c5e86a948b49f5b6b6723da58223a7f0d

    SHA512

    b75b4edabfcf6239360356289caceec704309c01ef7a0bb38c824c9712a1172d02ee4f154b4d887f0b866e8a1f6ef493f27b387fdc2574f815ed72b03f6c4546

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\MFA1KE1M.cookie
    MD5

    14f20bfe731fc05f85c3c36059039ec8

    SHA1

    196cd9a04cad6b6e4a03604bf5beefe55736eb26

    SHA256

    671ca7a1385bbfe5732135c0c06acf4759a0e20a281401f37c1d4278348101f8

    SHA512

    868c9372017322903c442bcf18a2a934bd577a51d7ef5891d2dd61682128461cad1152e8f455659ef308f1b1f00d7d21902efa706c4ab0d49b544b0994838fc6

  • memory/568-114-0x00007FFB60190000-0x00007FFB601FB000-memory.dmp
    Filesize

    428KB

  • memory/1928-115-0x0000000000000000-mapping.dmp