Resubmissions

15-09-2021 06:58

210915-hrw5dadahq 1

15-09-2021 06:50

210915-hlwxesaab4 1

Analysis

  • max time kernel
    73s
  • max time network
    143s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    15-09-2021 06:50

General

  • Target

    https://tender001.dorik.io/

  • Sample

    210915-hlwxesaab4

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 49 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://tender001.dorik.io/
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:808
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:808 CREDAT:82945 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:476

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751
    MD5

    54e9306f95f32e50ccd58af19753d929

    SHA1

    eab9457321f34d4dcf7d4a0ac83edc9131bf7c57

    SHA256

    45f94dceb18a8f738a26da09ce4558995a4fe02b971882e8116fc9b59813bb72

    SHA512

    8711a4d866f21cdf4d4e6131ec4cfaf6821d0d22b90946be8b5a09ab868af0270a89bc326f03b858f0361a83c11a1531b894dfd1945e4812ba429a7558791f4f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\644B8874112055B5E195ECB0E8F243A4
    MD5

    df9d36b73932f7d0866708aa05fb6441

    SHA1

    fbd4a4a91401bdcc8d639eae777ec71cfb2fce25

    SHA256

    b66f1a261fe4be988fd7ce26d1e5bb91469466ca19df602644beb37dc0e0bc53

    SHA512

    d1c7b3f29998c3856e7443d42ca9ccaa9d7b8204974d4f5cad72be8aea8aaaa17f0e4742ed5f3f8dcc4270aa7bcb0aae8c532c21be56d0f3f7a58463d6848909

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    MD5

    a92e656c2c5d2ba6287657c238a91156

    SHA1

    9b134f639767e19bae50a1f165651deb19e2690f

    SHA256

    e938e26d0122d77f48a18cda0bb2503e8fb4c204c2498c56a027453728640866

    SHA512

    54091ac5922965d4de8e844989a992ebc82d966b869ecaa9e04f36afa7bfca80b71ad8e97105ae366b7969e92da3fbd996b35a01f4f4c0db7b6afab51cdee28a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751
    MD5

    47ed6d93ca5d108210e81dd4d4672d81

    SHA1

    78bea3c7fbe99bc6858efa379d32f111c5fd04f0

    SHA256

    3b61fa7adcb49eba67dde69a9597530777d24070f8cef1b890e3a2b841934d04

    SHA512

    8dff6d3c2236b6bc560c3ba239bfc2ce08548070ce3c8f745f700156d0da274fbb508a2b8fdb689e5e7982f52fe24c5070fea22e3e0a90ee2746d6bc48e01be5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\644B8874112055B5E195ECB0E8F243A4
    MD5

    c8fd39c22500d2d88214eb1961a31b66

    SHA1

    0d18c087f202a7e9b034b5f2c7d858f3baf0578a

    SHA256

    82d4fedc05084205a18b5976111b4d3794a75643339530022d77fb5ce68d7d04

    SHA512

    a25fbee2d2cfa7ca747d3629661172ddebbfd7a857edb0ec325381a00a086e4d5cf8a88a37ed5a2a071997a494ef8cdfbd70a2908bfee917ad738970189a6391

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    MD5

    181779fa5e0db226b6e7e66f11ecce4d

    SHA1

    ac5adf1fe9668becc28883d51dbb0bd08f279340

    SHA256

    c8d25674cf4ae89f7ebdd21812f1bb91031ae4ad021fbdd13f03cc39c02bbf44

    SHA512

    87cb6afcdce02290d79fd4a5dd3c1750a7404e964537573dbc1a591947b2c9529eb851645d0185481ebe833bf444fdcd837c2e9004fba6936953530968b873cb

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\3IWREF99.cookie
    MD5

    65cb58c4de81ffd0ed8ac264822f1137

    SHA1

    7e358430311c8fa81786a24abb3821a24aae6332

    SHA256

    4cad75ad235d201c2d820eba472b9654256dd117df39d9b26a0fbfdddf64a546

    SHA512

    2797364e453335b7f8c277271b7c87c7964370d603d0cc6603ff015473024e03e59587bdd3933fc09c446b032ce1e10408bc0f74fb368bb87f710f3c28b2ff8e

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\TYR8IFYV.cookie
    MD5

    aaadb0364b26cc217a731a57e7b37ca0

    SHA1

    b581c70ee21d05709411aed1f81c722cc6f77592

    SHA256

    6805325645d3d8ba12503f6bddc294404b5a88320999ef16b20329d4e2dbedd6

    SHA512

    ddec4390a171d1b59d6eb9796b6f95986ce21fa4ac625179a124313430fb15cc22688bb8d14360fe9dac37b44ac8f458b872fc6156d10ba53bb9ccd70eec872f

  • memory/476-115-0x0000000000000000-mapping.dmp
  • memory/808-114-0x00007FF91F650000-0x00007FF91F6BB000-memory.dmp
    Filesize

    428KB