Analysis

  • max time kernel
    89s
  • max time network
    144s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    27-09-2021 00:51

General

  • Target

    http://tracking.directservices.it

  • Sample

    210927-a7ntyafea4

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 49 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http://tracking.directservices.it
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4000
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4000 CREDAT:82945 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:688

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    MD5

    ce98c91d236b64b56ca87fc7186af2c5

    SHA1

    ed75a894a924e03763b46178ae1a6842f91b7a24

    SHA256

    d28dc7a774741853733d1e6e385f27c910d0b97eda6f0a1ca47580e85c6e484a

    SHA512

    2787eede0e61b8e938a7fc47534b8d2aa31a01920013752bb4877c81e728931b9042a8ef5304b7e919f2e83bc6b1d1726bb1d34888e82f6a0ed4f34512b881dc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    MD5

    43ac72dfaa0cc5d08b439e99d06ab5fb

    SHA1

    54518201f37dd7d3d625c627de634aaac9f903b4

    SHA256

    dc0de18e4651ed510fb44840b26de4a232185edb6bb4d50cf82d069f0880de1c

    SHA512

    f67845071ea9880828885adc1b6761103012d6ff726be9a275bd917eb3c11050c2acd03f22bf84d9c8c8757314a91db92497d4573202f0dee53ae002f7ea56b2

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\32ESAZK9.cookie

    MD5

    143d6393086832c32b4c71239e76a682

    SHA1

    bb9b57b064984afce27dae33ad0792040f332ca6

    SHA256

    1046e00fc707aea5a6729f6ee8eb6cb86e1334ff5b3ce9270786e98f9b16b317

    SHA512

    7005fb2c7de75e3473b8fa8646e0e1e24b9d57a375bf71229bbbdc13b0a5f0d3878174d8866415cef877f262f3b61ea5e2f773028b48fb5452a908ec2ed74403

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\IGF4Y1Z3.cookie

    MD5

    ba0f18a6c20c22ceded15a9b55d45b2a

    SHA1

    219db3750a806bad42a182aa7b0cb5321cf9bed0

    SHA256

    9cbfbedc362b7229ac083e60df4eea62ee76e3e8d2937b25685a4c7b281008fb

    SHA512

    6637b5c64eb458b53e65395d096d06c1b4e729b2d1c4483842b4b1a5ec7e16d815eb128ff10f212d3354e0cabb2d73a657585c0a33f7af1e38dd399bca191936

  • memory/688-115-0x0000000000000000-mapping.dmp

  • memory/4000-114-0x00007FFAC07B0000-0x00007FFAC081B000-memory.dmp

    Filesize

    428KB