Analysis

  • max time kernel
    133s
  • max time network
    141s
  • platform
    windows10_x64
  • resource
    win10-en-20210920
  • submitted
    22-09-2021 23:50

General

  • Target

    https://onedrive.live.com/download?cid=FDBD3A4468B38F5C&resid=FDBD3A4468B38F5C%21104&authkey=AMAZHJllixGMXtM

  • Sample

    210922-3vw9rseaf2

Score
5/10

Malware Config

Signatures

  • Detected potential entity reuse from brand microsoft.
  • Modifies Internet Explorer settings 1 TTPs 56 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://onedrive.live.com/download?cid=FDBD3A4468B38F5C&resid=FDBD3A4468B38F5C%21104&authkey=AMAZHJllixGMXtM
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2396
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2396 CREDAT:82945 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2680

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    MD5

    6184b0e7016067db51a6ecf5f3fec69c

    SHA1

    d95dc8253b3f7ee8eab391a9933de56929b7b9a8

    SHA256

    f0310616d9b89c76451b430a7849df7d6de967e7be98d4db98b18b13fd0d4c24

    SHA512

    1d5a39ff7c1a9896999b5a571ac198c8c7c667737f9970d1b81c49b6d20925bc800df7b5f2cc890a079646bcf8e7aba25934018e55cf555d1873f0f19dbf05c2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\80237EE4964FC9C409AAF55BF996A292_E503B048B745DFA14B81FCFC68D6DECE
    MD5

    cffb804ecaef374e696cbca3f03d45a1

    SHA1

    a1ec79a148bc5c36863ebad8fd3f0a6ea2c238b5

    SHA256

    a372f1bdb6508f1cf52adbdd74932b5ec96237247479165b17215aa712a8645f

    SHA512

    c5a864f7f300bc84d3672e5ca5ff567b4fd9c7c5c92f99d2211514231abceb0755d33ceff0c75a9c17ae3f817e6651d2287b0165dbc37b79d03d9d6211db31d6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    MD5

    c35f5ce6d238a18415566b943d0ddcb9

    SHA1

    26f5c7a89cb1df82ad8c5259b13b7c149cd9cdf1

    SHA256

    5a2aa915af11874538b3762124208c2b8f9a45e0042d6290806f5deeca107718

    SHA512

    5d598d01dede2c63fe90eb819f83fb3af81b8775b66050bd62817f9a47ae0f391389111ca8b10af8623cd045ce1c6b262d05df0c775082fd0c83374ac52dcc0e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\80237EE4964FC9C409AAF55BF996A292_E503B048B745DFA14B81FCFC68D6DECE
    MD5

    5593bff972b05ddc8fd2f7ba87c12600

    SHA1

    cbca96cf1c706ad54290c8feebc9022b86609bf7

    SHA256

    5fd85682175feb061d16f048584e4bcc6401fdeccbdb0d66e0d0b0947a99df0e

    SHA512

    d755419120fc85d359b6497ce424a277bc4eef7def8ae3ed6c53fea5bd91fee865ac29a7bb27317f5f28e645fb26394aabe9ad665ec9bdee8dcc2bfaca53574e

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\EDMHYVSR.cookie
    MD5

    97d1ba8e4b3d9165cfc2dcb1be5019f8

    SHA1

    b7c2f724798ab87ddbeef9917efaaf9a2ea2657b

    SHA256

    5df7e5d51e92d8b1781d347440b842b46b72b8e309dab096a90d2545cff8a9a2

    SHA512

    84673258d271d7d7b5cb236818e046fe7b8dc8e71ee0848087467603078ddd46e0fb2d97f7b5579a547e8187aec6a0084d367cfada6491a043222d9a6629bf7f

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\JTX25RDL.cookie
    MD5

    a2fc4fa39df6f2568094666b1f934415

    SHA1

    7fbff90df62a8095dafa943932e6849ccb9e62ee

    SHA256

    9dfa8ebdb08e449a5be9ac95c0bab3c6cf2c3addd4760be1aef1a32556f5df8a

    SHA512

    b2babb230a405a3dfff3461cf2421cc0713ff91d362c24af0471f4f5042d761c19153c0375c8fbfbae5a5c1506970fcc5b4185033dceece2a4c99d2958ee329c

  • memory/2396-115-0x00007FFDE8A50000-0x00007FFDE8ABB000-memory.dmp
    Filesize

    428KB

  • memory/2680-116-0x0000000000000000-mapping.dmp