Analysis

  • max time kernel
    72s
  • max time network
    143s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    26-09-2021 13:56

General

  • Target

    https://Ffirebasestorage.googleapis.com/v0/b/mrje2n53563ghdgc0eetsra.appspot.com/o/Bn.html?alt=media&token=0f034d1d-cbf4-4703-a4c2-ba4dd123dfc5#

  • Sample

    210926-q8x21aehf5

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 47 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://Ffirebasestorage.googleapis.com/v0/b/mrje2n53563ghdgc0eetsra.appspot.com/o/Bn.html?alt=media&token=0f034d1d-cbf4-4703-a4c2-ba4dd123dfc5#
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:664
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:664 CREDAT:82945 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:488

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    MD5

    ce98c91d236b64b56ca87fc7186af2c5

    SHA1

    ed75a894a924e03763b46178ae1a6842f91b7a24

    SHA256

    d28dc7a774741853733d1e6e385f27c910d0b97eda6f0a1ca47580e85c6e484a

    SHA512

    2787eede0e61b8e938a7fc47534b8d2aa31a01920013752bb4877c81e728931b9042a8ef5304b7e919f2e83bc6b1d1726bb1d34888e82f6a0ed4f34512b881dc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    MD5

    0cf3bbfe877b3ef86a2ba260fbeabfca

    SHA1

    517abbee13e45076e7f496cf8193b1016999da24

    SHA256

    ade1ba235f37c86f84e517aba777a2838eccca343812a11206bde98553449f92

    SHA512

    ae920b73c67fe0385547a13fe6e46ee3bff4899456eac7108f75851fad89250b1ea53b13686881c6f6dc797f6d243a1e58f3086dc1600a71fd597d1632631110

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\UJL3NFC0.cookie
    MD5

    1fe1a528ec9bada8cb559c1412f286f5

    SHA1

    a75404eeae1bacb2ffa9c1c32569303991eacb1e

    SHA256

    916ceb19fbb2e4ea1d521f83f6bafcd5e1f8c19104def65911f7263937925ad2

    SHA512

    b00a81ef9ea704aa71ba6af49f2cfdb6afedf58f609e93f2c2d32d5c35b14c6d3a50dab26cf939a413a3746b425c87af973cee4db6fc04ff973edf7b55133473

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\W1DXNU8W.cookie
    MD5

    6d0dbfa44fa2d68d4cc9bf4d671b8111

    SHA1

    6d7f27eebead796621c0a32d88e2b0c17334329e

    SHA256

    1f98969668b4974ce0038961e59dfd5fd67d677aa6f681a6aedc1a453557db49

    SHA512

    e6a092f241a11f3f840ef2a204ddaa5a3e6fa693c092df4306c12280bf306972d775394680bfe826506bc1703ffa405c7d2aab5670be4444d4050a33edf396e2

  • memory/488-115-0x0000000000000000-mapping.dmp
  • memory/664-114-0x00007FFAE36C0000-0x00007FFAE372B000-memory.dmp
    Filesize

    428KB