Analysis

  • max time kernel
    135s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-fr
  • submitted
    10-09-2021 00:52

General

  • Target

    https://ankltrafficexit.xyz/trafficexit

  • Sample

    210910-a7538ahad4

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 41 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 16 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://ankltrafficexit.xyz/trafficexit
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1796
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1796 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1708
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1796 CREDAT:340994 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1644
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1796 CREDAT:275475 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1144
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1796 CREDAT:472090 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:536

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    MD5

    1254cc28894c6d1881d8f0a56971b4f2

    SHA1

    1fb938bf1562d6e9e543a9e955486418f5c47081

    SHA256

    52b7decdd94c0d6c52e8cd36437725b092b9dc7f8aef6126541b5c1b4b57727b

    SHA512

    64945cc198d6a242b42ab21015763a08b50ab7d682f31e613eac1b1fd3740899786bea1e13107f5e33e382987e95b30c2e68d75eeb65794e5a88165c5ccf94b5

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LX9K6CVY\D1H5JIVI.htm
    MD5

    2f90e5f9c9a2c6a00cdb43af7a75693c

    SHA1

    a47f8aef4ac6913aa1f82a7225c9c181f1a1ba79

    SHA256

    1b33286048ae7931fea09ed7de9386ef1c3a6d17525f0c6929e60190fc852946

    SHA512

    b2609a2534bd5ad40d9c9dce5c6b2f6b6bdfa3c27ec0e0dbb291c5b79d574c0743d5cab7de44994eb18d6e37e7c0d4e52ee2bae0198996155a718e853ef34e62

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LX9K6CVY\RU5YJ2RT.htm
    MD5

    98d799128abedc7d4383d76a7622ae49

    SHA1

    04b102c6ae7fdb3e4cc6a503faa0d70bc992460d

    SHA256

    7b20fcf20bb7a74dc3a4d2613d4fe5c6968079ca9a627052761f9e8504998774

    SHA512

    da6775e35d9ceda62d591647bf2d8c2948947ed28c5af773f983ef336e0d6422617eb51d0abdbac5d22a813263c5c0323f4bc918041067a1ee9a3e8a5586e8c8

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\E0MWT09J.txt
    MD5

    3639787837471d3b88c202f628fd4d56

    SHA1

    8ea7b1e6a2ffa2b185130b497331a9ea4418fb06

    SHA256

    0b223a5d1d2b80cb402b412ed1f6c274d55759b45f1545e849d107c2c32b03ab

    SHA512

    e359d26e1bb8cefb8ac93adece713f1772001e735debc3bb33f57619a2cbea591a5b337dd7cc4449b6f852b2bc6e51a683f8ff8002ab8eeb829be6ac26728ba9

  • memory/536-63-0x0000000000000000-mapping.dmp
  • memory/1144-60-0x0000000000000000-mapping.dmp
  • memory/1644-56-0x0000000000000000-mapping.dmp
  • memory/1708-53-0x0000000000000000-mapping.dmp
  • memory/1708-54-0x0000000075F91000-0x0000000075F93000-memory.dmp
    Filesize

    8KB

  • memory/1708-55-0x00000000005A0000-0x00000000005A2000-memory.dmp
    Filesize

    8KB