Analysis

  • max time kernel
    131s
  • max time network
    143s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    22-07-2021 11:18

General

  • Target

    https://portal.abicarehealth.co.uk/client/

  • Sample

    210722-ym5e1jer4n

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 55 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://portal.abicarehealth.co.uk/client/
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4056
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4056 CREDAT:82945 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:1564

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\709A8EC0F6D3194AD001E9041914421F_4029168BA919BC698BD90F215995864A
    MD5

    a349d07eb499a4def8987dd4e8bd43d2

    SHA1

    122e76d94c34b038e2f4787f9f7e94f056557184

    SHA256

    05813aaadefbaf66d41ab4307676a3fe7c3cb9b5e403da0a47a9d7e1c0c896de

    SHA512

    c75cf339e66f19a6d64ac349739bcd8e494615e53a98019dc644d51f48613545a5cbd773a750784831e25c8fe409546d42ae26a2c0dec298a78b10d5c29afaec

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_86C2A03C133240EC4C95180B9FD368BB
    MD5

    20364f905cce81ab9d8a66566e50766e

    SHA1

    fda9c1dfcdcbdbf5064b66c00641267c3473f9ff

    SHA256

    61943311435615dc7151d16620bc8f57267e3fb45235247b45a96423bc839afc

    SHA512

    f6e31854fb988bd48dfd167d38d30037984f0cd121cca5ab5b593f81b1f922027d7c5c4412c706d146a2e47f1e1b16c29daaaae878b51421ba4535b8a7eaa19a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    MD5

    4b8ffe79016c051a1fa57e4ab8ee0e0b

    SHA1

    a06394b4c74aad7d296327a942729db01486ea26

    SHA256

    75e171759473658cd648f09d099b249f99a7cb139732201576b07c4554a9c4b9

    SHA512

    6a057cc6cc12715d6324e0cb8c22c3d1ff5a8bd20c5ecd10e64ae155a5a5936a972374fa8005d9cf195fdd44deeb24e54f27d3eba78aa0f3a82e03e272e39091

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\709A8EC0F6D3194AD001E9041914421F_4029168BA919BC698BD90F215995864A
    MD5

    25b6a6304a0923c2996573ea6c6faf4b

    SHA1

    9be2c665553160eca80d32ea087c93ee529891f1

    SHA256

    a0546b68f3f49487b789a01f584fc5c3f7d2b89714e3c8869e554a7fa9d41371

    SHA512

    14b4ea86a9c59295614218432a57c85c515bce74f1964a376b173d92e4abb931bd1b54776bed5ea10a64e6fb2f5c99c4b718b20b650a09c62bf319b2ecee246a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_86C2A03C133240EC4C95180B9FD368BB
    MD5

    19ab3e5adb0e5fb392e278267e946e35

    SHA1

    ba5735f97025264f4dac2964b0265fd8a28a461b

    SHA256

    5fa6ced9148f1ea94a8a9a3ed373e21bb1e7f84a7e7f48e6ac2e4a08f22aa250

    SHA512

    8a4bafcc3f00ddfe194b6b1b430e51f61279711fabe553209404a909201d3a9246a2c7dc146b6da51dea94173371f507f8321800da613014ebc9cea65e22cf26

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    MD5

    fd70bcfcb639fb150b43450c64122da2

    SHA1

    be11178b68d970b87f5227d119c2acb7ad100a41

    SHA256

    0178e7f4598c3685ba52e0a04d09b25609a53e2afe37d72c93c33718c4970e49

    SHA512

    2e3793b31a208ae1d61b37ab3dabad36450da63f1ab62306bacf42993c08fbf7ee102c9e1840589e58253f2a7661d5ef20802c973eb45564ada84dacc6218b6c

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\CM94U642.cookie
    MD5

    69f6f019478fd03d1322828a06236eb3

    SHA1

    30e1f8fc9f89ca3c2e43d6d785b40fba05f30704

    SHA256

    00fca6ab44e8f48094b01bb2ddab144779c6e1fae64099df659cc5c939321616

    SHA512

    866baf67a0268b731f4c8ca34d1864ff3a0ffcef1814cc5e153a62c44a95b1c26aadb6f5370cee75c30cd1ccedd7fbe7068cab542b57affbed78a3ae1804c0f0

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\EFVR7HDA.cookie
    MD5

    48102d80b5b3fbd7efba081a22d2b279

    SHA1

    527e3943be942dcc8b5561e3469b2cf72e31ca18

    SHA256

    953a7e6f5eedfbc58ee13b970321aeb2c43470210ba054c672dd44429f1469c9

    SHA512

    d9655ea8f8f581dc4fb41082918ceea555073c7cd5d4bbdc91d15506de05729021e3584b28b5ef768c94d8e54ff1662030eb82a6634ad69f9abe2b05332268f5

  • memory/1564-115-0x0000000000000000-mapping.dmp
  • memory/4056-114-0x00007FF85CCD0000-0x00007FF85CD3B000-memory.dmp
    Filesize

    428KB