Analysis

  • max time kernel
    71s
  • max time network
    152s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    22-07-2021 08:43

General

  • Target

    https://www.felipebalestrin.com.br/wp-content/uploads/2021/mrzjjzucaekshyxo75ptcqgeagcnrtvjagdtgftxwkqbr22zo4b/krzqnuwrwmt6dq6utuyv4nhpzmscvcf3xf3wqimpr7myualswp/mtjxyz8sceaskanjcxre6pv37ucnzqgwpyaxgc4ajxfxyxdyzo.php?

  • Sample

    210722-zjrmshvnk2

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 47 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://www.felipebalestrin.com.br/wp-content/uploads/2021/mrzjjzucaekshyxo75ptcqgeagcnrtvjagdtgftxwkqbr22zo4b/krzqnuwrwmt6dq6utuyv4nhpzmscvcf3xf3wqimpr7myualswp/mtjxyz8sceaskanjcxre6pv37ucnzqgwpyaxgc4ajxfxyxdyzo.php?
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:664
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:664 CREDAT:82945 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:3948

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    MD5

    4e64ee3a1f4c34f528e8de9b728dbca6

    SHA1

    9b27bb889cc2fe2fbb89c0c7c8aa16a841291499

    SHA256

    ec75d601fb9309c65a60ad6bd10b10c5927c77648d42de670003dc0b2693105b

    SHA512

    e23b06910c9009d254dba06b1fe8910d10fd0c11cf0ad22ebf21cf41765da0f51f9179eeb39ca7317cf3ccfcce01622914171ebb9e7c661373dbc92acf9676bf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    MD5

    3a2f67616055a69fffca5de25226973e

    SHA1

    beb0736c990ecd3d9c82e434bfb6918b07f777a7

    SHA256

    dde1429b3a0293d176500c92e8fcd75d2032099a28db9d197287131f13b6df4b

    SHA512

    a053ba7f1d5c18b2ce9d71523c90639cd458ba23492532ca70398f87e6db1d180417535beba3f17d616462f9acf4f8e3dbf4045ed626fac7b274d80ddf01fa8e

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\C7CUASM3.cookie
    MD5

    cd3857caaecb4bece2ef4cab572c60e9

    SHA1

    482729a03c68ced2d8592b581ff596e6df6bf19d

    SHA256

    213e573ced688498c8318a42d87a646b433604ab5536b4e861d9cfaef73c65b7

    SHA512

    1c9001720c6ff055b6b1add43f974ecd8b5cc549734a0845f0ea1e19154258852915707acfce171ec9789b63aa5d726031faa0dbd3c78507d869afb8294c3b0a

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\CQ3IFJMD.cookie
    MD5

    74fe3c9264d99fe62bfde930f6027ad0

    SHA1

    75c91d2ca993dc33cd10a1bde50447f469f37eb1

    SHA256

    ae1b63dc1694c9c1670620ec82862f6db7ced2740591bdbc7ea614750e9bc83c

    SHA512

    401c6c62d5ae1623eece0edb8cf64577a5b891bdef7f11926e35d6783270aa71d6d82bc231c2da4110124b50d0dca40c2c35e9b653bd78f4186e1cdd1eede0c2

  • memory/664-114-0x00007FFAE0360000-0x00007FFAE03CB000-memory.dmp
    Filesize

    428KB

  • memory/3948-115-0x0000000000000000-mapping.dmp