Analysis

  • max time kernel
    136s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-de
  • submitted
    10-09-2021 00:52

General

  • Target

    https://ankltrafficexit.xyz/trafficexit

  • Sample

    210910-a7538ahad4

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 49 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 22 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://ankltrafficexit.xyz/trafficexit
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1892
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1892 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:908
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1892 CREDAT:340994 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1600
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1892 CREDAT:603143 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:268
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1892 CREDAT:472087 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:828
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1892 CREDAT:406568 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:860

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    MD5

    9fbef1befa446025ce0864c95d4f584c

    SHA1

    ca58e6d79aaf4a03d74e2072204e9962df5e07c9

    SHA256

    9f5b2ee1e26938a330c45ceb3c2939fb9177a433ada5353f75baa8314b4414cc

    SHA512

    61747c0177e696d488de8e9b74a2758f5d4b40730239c7aa723b0846a03b94dbd45c3b6180158f2344c56b690ed9cebcb1dbc9674ba6952c444fb60825aff6b1

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6V0SSI7A\D04BXUJR.htm
    MD5

    c28b7434ea002351d04095608c7e8e9b

    SHA1

    1c54e6d71c2c1b2ad7f67d369696c1ce702dd544

    SHA256

    5d1b51cdfcf5a97a8f90dc001c21d28753c955188f57c5391fb8acfb4c7d8824

    SHA512

    e467c0f136ef4bd0c1d3e3a1043b180fdd23bd169ee8c081a7eacc9354e64c164665fc5553ae83e95e1d9d99da1dc6c33ece90b4037ed100830b3b3dca760962

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6V0SSI7A\WHR6I6TR.htm
    MD5

    0b538adb2251becea5d351bc70b274de

    SHA1

    e2d7e0475183bba838b32a1f534b01e5d78b211b

    SHA256

    ba69238cbe2235623e8390e519b862033d309400dfb7682b25000ecdc5f8ab23

    SHA512

    1521835a5a00f54235ad23145c994e76955c31696a5fbc9e4b955e87066d6c88885275bef1d171cede3c08ee0f71c8f064af2f4cb46d2d63031f94dbe75da42b

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LX9K6CVY\CAJYIG4V.htm
    MD5

    155f3a61e984e9564080b94a5de87bf5

    SHA1

    e636ae9f63115215279babb0c36877e6978c91b1

    SHA256

    0d514a1bf15ab5b4124cfa4c3a7691ce630494d02e34c923c3e1feae0560dd71

    SHA512

    d6404e413a36dfb87f459adf48453a15e86062f354e38a22d148b1269d11d9a604d9f490cb774a40766dd27432d5027960f93c26bd20afd977a50b17ca2ef10e

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\NYLJW3Z2.txt
    MD5

    7f9bb2ae3193376b1d33e8d326e0a622

    SHA1

    2ba0117635a796dda5059945b97dd4fd707b8d9b

    SHA256

    7f8be38423221e4a555cbefe9715a1dca5e6245d8f52f3573eaa7cd6bd7f8b77

    SHA512

    faafcff0baef47868b78ebc6cde366c651bbc2c93e1be074aabc0e18fde243fff9993bb07f6a49d27d0382a9c3eed61228e822ba4c1d02fd16a58c29abd8fda2

  • memory/268-56-0x0000000000000000-mapping.dmp
  • memory/268-57-0x0000000076071000-0x0000000076073000-memory.dmp
    Filesize

    8KB

  • memory/828-59-0x0000000000000000-mapping.dmp
  • memory/860-62-0x0000000000000000-mapping.dmp
  • memory/860-64-0x0000000000DE0000-0x0000000000DE2000-memory.dmp
    Filesize

    8KB

  • memory/908-53-0x0000000000000000-mapping.dmp
  • memory/1600-54-0x0000000000000000-mapping.dmp