Analysis

  • max time kernel
    71s
  • max time network
    143s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    27-07-2021 18:24

General

  • Target

    https://tracehere.page.link/u9DC

  • Sample

    210727-b6sfhlrtb2

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 49 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://tracehere.page.link/u9DC
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:664
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:664 CREDAT:82945 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:3236

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    MD5

    c3f544b1ccb3d30c4a4d641d42702778

    SHA1

    07c50009db6f83442fbc2764ba58dcbea6bcdc1a

    SHA256

    a7c6104402e1a41d0c9ae3b0a4f5943528314aa48edd72d576068ddc8389ab83

    SHA512

    3553c09e54c6420d81975612e0877d392fbd3ed9730e1a3a87d5e23ed3ca0c4770e8b60bd296baace7e6baec3c084756a687b1b3a959f06b5df41b664db22824

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    MD5

    26dee25e5a811b6e232e474dac70cd85

    SHA1

    8c59f1a5bdc225188459448752888f97a93cc061

    SHA256

    eff657888e0aefda380682ad407a90d7d99ca9e0a4b7851ac65a2c19cbda2ae4

    SHA512

    2b7ef5864b8cb66e57fa09e0b080837ea7853bfe55fbfef3bb33445332fa0571e8b9e6159dfd6a772b376497aa79c6c6603b78b7220a4533128eb5660001f5aa

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\CX9LEQ7B.cookie
    MD5

    2aeb5bdd048b99ca5b6cf9081c46e079

    SHA1

    546b4c54ef0c4423825358edaa96f598f6a27c47

    SHA256

    8c610866f4b4abcd95bff1be979bc69bf5ff22d50bf84630bfca461a1bccb362

    SHA512

    794d68fe4f423331507ba39f1c4f728aeb4ec13b367f02fd6538301c9639a4937f291571ae95a31f2b933d563bb10cb41d57563e1177a78769fbdffe075bdceb

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\I3LZ92YR.cookie
    MD5

    c7950c443cff1a1e3901a631c7fcfb04

    SHA1

    e0a98f2b6f68cf135c12e24598f30bc45b924865

    SHA256

    dc00b9223014a3da522a3a9c1b8f6dc3c5c3c15357ff5a412ddd30fb0730463b

    SHA512

    6c404524220b0c7c249087fed5333fe961b8c075d0cdfc922dff7e0e0122a06229d46c193a1b1a19bf825125f28ee3f7bd18c0a849724445b3910edcaa8015bd

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\S8QZ7MCZ.cookie
    MD5

    e78a424478c2e80e55f82060739ed2dd

    SHA1

    6a282789921e8144d8016fac7554b501050c77da

    SHA256

    a100db80d15db11c353e85159d2028d3d1859f747cb3fef7e18969c69f33392c

    SHA512

    6f7088e4bd219ad17cae652c361a172334cf39bc2a99f2cdff8acc88cff10ba2c9f0a1103b34d0bd90168d9f1fbdb47d5257d5c2a2c2f12db62009999a44b8e3

  • memory/664-114-0x00007FFADF6D0000-0x00007FFADF73B000-memory.dmp
    Filesize

    428KB

  • memory/3236-115-0x0000000000000000-mapping.dmp