Analysis

  • max time kernel
    137s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-jp
  • submitted
    08-09-2021 23:45

General

  • Target

    https://nawa-store.com/shopinside

  • Sample

    210908-3r4jnsadgn

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 45 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 20 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://nawa-store.com/shopinside
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1996
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1996 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1872
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1996 CREDAT:340994 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1316
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1996 CREDAT:1520652 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:604
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1996 CREDAT:406561 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:548
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1996 CREDAT:1520667 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1564

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    MD5

    85e8d1e212db0f5acd09328ffbb8978b

    SHA1

    9884e99bcb9379fdd100c02d2e55c32d73c1e892

    SHA256

    dcd5e80deaecd80be32d15288ee344ee54b8c44a86d68cf73a1414173a8395e0

    SHA512

    6fd88011d9fd2026b396142b670add5b5dcdfba02061a325d68ca534316c076ba0635a0963acd942de07e32da51c235adaf38fcf8673a8b5e131771b3c3f338b

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6V0SSI7A\13TC2UX9.htm
    MD5

    ce6937d6985389879059d42a08f5c218

    SHA1

    ecba9968864632044ed2abb22afe2c2c8d40054f

    SHA256

    bf2e29b7cfa5b0833557e43e7d4f8858c38abc40615b729e8b575b81a8747671

    SHA512

    ba3ebc93be92feeac29dc8e59e6939095c59e4493a42a6cca2eed1f42bfe28225f58265d5ba91d5fedc37995920bca242d546411156617333c6178ff751c01ef

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6V0SSI7A\AO7H4NRY.htm
    MD5

    7a62b9bbb0eec86439ac366f5b79c1d0

    SHA1

    686e71333ec937126561efae0aded936024794fa

    SHA256

    bc041ba1ffd500b6c85e3be4b7fc5888bdd60818161ac37e5183084a66763427

    SHA512

    c64a35c1abb4565f888b13ce124a6355f8bbd73a12a3b71c4688c3d8344dc6fc69a06ca36e2fc7172107b33755e80a33f2d9fa3feb5d7275ffa2ec05d6ad8d32

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LX9K6CVY\CY6XQVNM.htm
    MD5

    562e7dd34e9b778dc25f82f55a1f7bd1

    SHA1

    dda9c1e209367b9c091ffbb8640bc2ec51819fb1

    SHA256

    d7a892131eb33450b9a4b47a5d06471f02a59144aa145360e0a615bd1bd8a5e0

    SHA512

    030b5228d70effe3fe1c9bc53f6feac27237daf158a45269091060de2cc80220c93c1ebe1751d2a71a6aa5c736ac380d16d83d9047d2c42967c718f3c54e4f1b

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\T6H2YU56.txt
    MD5

    d451a1e3985f68ee8cfcb0f7ef2b9106

    SHA1

    494d205be786a55ff26eb71466c02bd6d43e34ee

    SHA256

    f8e1f5a1b97e1b713b3e16c64a52d37e78bd6c895d2574efaddf57c6e073bfc9

    SHA512

    db8dc9274d037cf5568074ac56c9063e9bb256f5b1bcb7786ad8589e713e01edba6e1a0beadf392a2318e40916d8d1ea3945df50f468cf71a54c30774f874a5b

  • memory/548-60-0x0000000000000000-mapping.dmp
  • memory/604-58-0x0000000000000000-mapping.dmp
  • memory/1316-55-0x0000000000000000-mapping.dmp
  • memory/1316-56-0x00000000767D1000-0x00000000767D3000-memory.dmp
    Filesize

    8KB

  • memory/1564-62-0x0000000000000000-mapping.dmp
  • memory/1872-54-0x0000000000000000-mapping.dmp
  • memory/1996-53-0x000007FEFC121000-0x000007FEFC123000-memory.dmp
    Filesize

    8KB