Analysis

  • max time kernel
    117s
  • max time network
    143s
  • platform
    windows10_x64
  • resource
    win10-en-20210920
  • submitted
    27-09-2021 00:27

General

  • Target

    https://secure-web.cisco.com/1cX9ePicSBEaZ78AKyK7TDT9HJr1Tn46Kz6jkmutMGADo6nBFVtyXuOzosH7JtnAvDrIGwuT-jToMhNiP_pQqQP2ElYYHgilwGDYBHv3Ul7-a1NIR8ODIkcPltnnp6Kgp9rFIHqUmX3V5mzuLxeewxKSjmbMFFOzdXE1EVW_AqMNVMqBzGWuHgp1QIxArc5bkaEeBlHV7tmQ7m_hhmJi-kybJDZfv74zOECgl4ZsJPVv9Raydpo_JIHeIUgwvKM7m5hUjVEH3YJ8Mugf9TQWSWZCzaqJUdZSJiSXDjnL4yJup2_WXLHVTtq1pVV5jv_XjwF2o8P1MAf9b2KYE0B0yrYdd102R3KwCL23Y1jRqEF_NoASc489VMQucjCIMY3LwglLUlaqcyJ4boT-iPLfv5A/https%3A%2F%2Fsurveys.westpac.com.au%2Fwix%2Fp1254324.aspx%3F__sid__%3DZSEQpAYg7HrDx-JX3TWYk3a4S6g1Xy1iEMYrHUh_iUoKlkh9xdNOS4jGPqk8xV-vc5TGkN59x0uDj8NwLJXhhg2%26unsubscribe%3Dtrue

  • Sample

    210927-arsg7afdh5

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 47 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://secure-web.cisco.com/1cX9ePicSBEaZ78AKyK7TDT9HJr1Tn46Kz6jkmutMGADo6nBFVtyXuOzosH7JtnAvDrIGwuT-jToMhNiP_pQqQP2ElYYHgilwGDYBHv3Ul7-a1NIR8ODIkcPltnnp6Kgp9rFIHqUmX3V5mzuLxeewxKSjmbMFFOzdXE1EVW_AqMNVMqBzGWuHgp1QIxArc5bkaEeBlHV7tmQ7m_hhmJi-kybJDZfv74zOECgl4ZsJPVv9Raydpo_JIHeIUgwvKM7m5hUjVEH3YJ8Mugf9TQWSWZCzaqJUdZSJiSXDjnL4yJup2_WXLHVTtq1pVV5jv_XjwF2o8P1MAf9b2KYE0B0yrYdd102R3KwCL23Y1jRqEF_NoASc489VMQucjCIMY3LwglLUlaqcyJ4boT-iPLfv5A/https%3A%2F%2Fsurveys.westpac.com.au%2Fwix%2Fp1254324.aspx%3F__sid__%3DZSEQpAYg7HrDx-JX3TWYk3a4S6g1Xy1iEMYrHUh_iUoKlkh9xdNOS4jGPqk8xV-vc5TGkN59x0uDj8NwLJXhhg2%26unsubscribe%3Dtrue
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1608
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1608 CREDAT:82945 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2468

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\2EE749B7E1A15635422518BB5EBFD338_2BE9BBF30BBE030BE7B79471EABFE00A
    MD5

    12e2b77aed34195d2de84296ab344b88

    SHA1

    231080519e8f291d11721fe21205d796cd27c797

    SHA256

    31ae848ee358b254fcfff06f6d3903ce93fa87663ca5b15799abe1dd6b2f0815

    SHA512

    fcccf81e300474753b023cf0c48769289f0ef0ffed789e44e3b2ee38b22641001083031a9ebbb9e392101eca9a7c1d705afaccf5ab4061f5f48aff2e643d9dfa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    MD5

    ce98c91d236b64b56ca87fc7186af2c5

    SHA1

    ed75a894a924e03763b46178ae1a6842f91b7a24

    SHA256

    d28dc7a774741853733d1e6e385f27c910d0b97eda6f0a1ca47580e85c6e484a

    SHA512

    2787eede0e61b8e938a7fc47534b8d2aa31a01920013752bb4877c81e728931b9042a8ef5304b7e919f2e83bc6b1d1726bb1d34888e82f6a0ed4f34512b881dc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\A37B8BA80004D3266CB4D93B2052DC10_994B5C515D64A296EABD42B0A2E46349
    MD5

    ae8ee42c36263def1c16aa294b50403a

    SHA1

    297996c4eb23d061f8cd8b7e6f737ed8de6037c5

    SHA256

    e7ff26024bc84cabfb8c08736da4138c9819bfaaa8ffade1a9bfcef10d273dbc

    SHA512

    f992e11b3910c3a8d816a9cc19f70e55eb6eb635cdc0b9af0d8f912f2a6503b353ab8863de2f002e49f92bf7184a5ca62c4e52296d5ca3a127a40f9eb033a8eb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\A9A2923BC865F3B679E3C71FB2AB7C8F_7DC37CFD3C23CAEEED5F14A81380DC43
    MD5

    a9922bbfa9c53ee2e0bd7f811081c56c

    SHA1

    9eebe73f32f38b46125bdc3f0c7f2d9a24347541

    SHA256

    056eb033e7d110d1b900fe2afb114f3739e2407cad53aa66de75fd1da099151f

    SHA512

    58f8d3d8ea969c2a5ade75b1ac4ba9b9054b20aea5990174dd0c3cb0125958abf4828cbbd5693331b347520e4949ac00b255861fc22430c01ba887200986b3e6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B0F2D31D2C32B49DCC8F7CC5C73F3C5D_2C8AAFA9D67255B0364928E0BF09B2FE
    MD5

    522474ee1fc0ed45b6ddd0fde1a77bc4

    SHA1

    bf46c73c92db548030a63ec95809086e487a046c

    SHA256

    963e095017b4ce4e3b0634932070b5a638fda4f83ab1a1ad4f619c482a8d3b3a

    SHA512

    8089095117aa004a151f288cc6bb1d102d74a6263ea9b96d16bc0f1ed422ba427af9e3d64ffbfa83b19ecb10a4a5e006acad2cbb26b4c3aa36cae1472b062bfb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\D8A5A4A0441F7653C3609E0E2DE6769F_95DE75E5FF6CEAC067E07DAC6896BF61
    MD5

    0942baf87337bf5df2cd981cbde836d9

    SHA1

    684f48154747d9f7b2547f3f01b6706e1da77c08

    SHA256

    17a873df80a7bfefddb2e7d8c84228c5dff475ca97d89c7bf0d1a6b116cf4d3d

    SHA512

    03fb8b18b38de4e294d8e2673651a85e3aa6aa4238c89345b7ca97a183d641cbfef993cac0fe92ad5b8c4ae9b173edabff0790341c68ba7dee262c51332613d0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\2EE749B7E1A15635422518BB5EBFD338_2BE9BBF30BBE030BE7B79471EABFE00A
    MD5

    3618b645d9990a1d0493ecfc4fcc90f5

    SHA1

    ed621790a86795655157994f3aca643fcfaa8426

    SHA256

    1f19e720c40e0a71d074b73ee7e5f313536d5e659c1f67acf0a4f5b93faa25ef

    SHA512

    d5210d3e107556787ea0bdf12383dd2da7064819c7d83368999a581bd225444a2b12136cc336f76f177a4beb082e7117ce54cc044b7c7c65d3b2618567e3546e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    MD5

    2fd629d4f51bbee983c30a6b34424357

    SHA1

    1e1ffb8a0cb2f6dc7f8182eb3cfc54dee828af95

    SHA256

    3d721d7a403586da965f7f7605d2cb89b03b7bd4a45d51e5da2d88e491f1de0d

    SHA512

    4982ae1aecc13dffecaf64bf2766a786880dd899c6f0bf4a111af7752112f5dfc6ac5740b59def22daca527e999e9e6b69ac3d12ed589e376efd86d981dfb66c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\A37B8BA80004D3266CB4D93B2052DC10_994B5C515D64A296EABD42B0A2E46349
    MD5

    31e9b6b5c8b7d3a96f989261f2a0813d

    SHA1

    91fe87f420ac900abc8fd7a4c969958c4340a76b

    SHA256

    6bef0bb4fe5966f17c76485d2a225529465bac1ffbf0a4a642f025828dbf1277

    SHA512

    c86fb15f94bf9e7a6aee776980f5bbd60b2344baa26937f5b7f711f656d42381c70213a6e2aa6b467d65ac382a05ea992077ce34653f8a26f8d0ea98a80313dd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\A9A2923BC865F3B679E3C71FB2AB7C8F_7DC37CFD3C23CAEEED5F14A81380DC43
    MD5

    c1458ea9fd797be99d432fa48dcdaab9

    SHA1

    c4283e499a6f49d320978c5c8a300c095f0f2bc9

    SHA256

    3279e590cf1662e20c3da25e34240ce56790248c1e67355669a6dd6aa4762ae3

    SHA512

    e8769ae3a52d6f2b0c44d8589ddf8e03fd26b9d52d622149d0644159343277e2ce5052725151e8a068a1ca9d277313989d3d1330bd38704aa7b4ec5e0c426afd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B0F2D31D2C32B49DCC8F7CC5C73F3C5D_2C8AAFA9D67255B0364928E0BF09B2FE
    MD5

    3bc7ceafd675547760d3a27a7e4208d2

    SHA1

    659aa95d5bd4333382993cc007a26268f60c5037

    SHA256

    b98181947b60c352a1909065c0f456734b20bd255ebeff7e87af159f97db6929

    SHA512

    8424aba8b036eece5481ba7bca75bdd3b2ba0299b98ad581267fa3c346987179e8846ed3218574ff504e9b658f6f2d35b6c86179c65402b7edbe234abbc88db9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\D8A5A4A0441F7653C3609E0E2DE6769F_95DE75E5FF6CEAC067E07DAC6896BF61
    MD5

    5b0da1ca3045421d4941c999bcf07198

    SHA1

    05967b71752124a5b2f3b9918d99611e487a7eaa

    SHA256

    97a99e2db21b93e5b2594b14137250c3e0132da4725b840f6c6d79394ec9b070

    SHA512

    2f70102b8837a3942da8a63e719f9325b7d27f8b897562ca09e72af86ed2c53e8581416336651383650e73d51e1be70a1e076a10a1191c3a6794cb40754cec51

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\543I2XIN.cookie
    MD5

    31391825a41e8523cd5c1e5c9a3b4e2f

    SHA1

    b910af926d30c80f89a56884dfb065b34ba5c59e

    SHA256

    e010ccda38c3f41f2f06282a9aac64e057f319cf6c090b611ce63f2c30a0badc

    SHA512

    a52dfc068f3f5a7cdfaa71e6fb090f83a7c47b256a04927c56dae19d31979eafd5b17ab37b6ec097f343ac75a259fdcad1363ac314ff487a94f836c968201771

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\7Z0F2LS2.cookie
    MD5

    c10a4b4e8e7825a2e47af23ef40c60c8

    SHA1

    28c6c669f123f342942b2341e1f89af0ca17e66c

    SHA256

    a888b0d277c63e74cfd8d10d0e69ba043691b0e40bb48d674b71c4ec8b1d4fbd

    SHA512

    a8acffe797cd00a553dcfa2e8db02598f6048b5819e86cb6f58d323b2d7191c5f4100a10932dbd28fad3e08388b17263799a0e2ec48c682e847900e283774f0c

  • memory/1608-115-0x00007FFA36A50000-0x00007FFA36ABB000-memory.dmp
    Filesize

    428KB

  • memory/2468-116-0x0000000000000000-mapping.dmp