Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10_x64
  • resource
    win10-en-20210920
  • submitted
    27-09-2021 18:53

General

  • Target

    https://fubar.com/join_w1.php?h=okvBRDnqTFRbtyd%2Bj6njX65Vo%2FlE7HRr&friend=16197767&[email protected]

  • Sample

    210927-xj4xkshham

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 56 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of SetWindowsHookEx 35 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://fubar.com/join_w1.php?h=okvBRDnqTFRbtyd%2Bj6njX65Vo%2FlE7HRr&friend=16197767&[email protected]
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2392
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2392 CREDAT:82945 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:2672
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2392 CREDAT:148483 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:3460

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771
    MD5

    eeeda27a43d988d4430c5ec48baa6ee5

    SHA1

    b4b8b322fcd792d1abd7b15f0f5085f7ddec4c32

    SHA256

    230cfc48682e372da4889dbf25db4b32a58d1c75606b6b947722ea35972cb7b9

    SHA512

    5feb88b14eb8eabc7a72851fb52780e5c52ea9841f0f3343a923b9dff53017b6579548629d5b22470e2bf1b2384a77ac618c85b4c485092b608e53c6a9b27db1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\67C4D4210BD7E21762B31C14A31F10DF_FE3097FFAE29833784F106AC18099D46
    MD5

    127c3b0d6e6dbd1f20e67d43a386582f

    SHA1

    cd7d1d193d2dc9072477a66d3f64eb73eb2372ae

    SHA256

    a18a6b6d200109615f0484fd952d9d60c15f8cd7ef03ff5ab8244e0b28c27b82

    SHA512

    92ef9531aa63741c58865a0d18f9d27bcc231ec12ac91a50c537dd66d38773303716f0db3d69aa34701b286011878204956fc132110678ba85480558e6712177

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    MD5

    647b8d7bc982449272d66d17e09f119f

    SHA1

    fcee7e5a6ae28bbee3a7fe3ea22144b0c08f929e

    SHA256

    678a5f60df00580647a5434128825237050133fe3243aee397d68f4610e1b050

    SHA512

    21636b5a029afb2134b029db32f84a5ef0f143fbae4f377949a79cb0f453ac50dde473d1aab977d02724d7547b59d767ee03cf6f4de59deff0e81d3da90d5153

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2D
    MD5

    765de023bca2365990988a99f517b2fb

    SHA1

    77c20f36ab02775ff29937b35818f7e8f1bcbafd

    SHA256

    64357debc9e6f5212027c7d3a75ade5009a3d81aa8f28dd5571ca3a87c14778a

    SHA512

    461dc102888b05dc556948b75cc982b6c19146f88fded520f63be20697c19f6ebe56042ec82244d4fac38aa37f5d2994a48ad74d5bd14879b50968cb11b1ded4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771
    MD5

    f5ecbfe9e71941a64c56029fa374eac7

    SHA1

    072c153bc70f006afaecda4012fa94ed4bfad194

    SHA256

    290183a1cbda1c7d62ec3f113a57cb85fbd7ae9dbd278e3906dc6b5269a49b1b

    SHA512

    924cf5b2dc26be3f26766543264e1403aa4106f4cd8d04db532b01fe361d3e8b8e5db5661090228fe8796538bd15525e3c170b16cddfead8bced970f136b9522

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\67C4D4210BD7E21762B31C14A31F10DF_FE3097FFAE29833784F106AC18099D46
    MD5

    432905f7ee82906f41fe516422c9c600

    SHA1

    4bec3a33c6009a61eb3bd4582c06063150e0e5e2

    SHA256

    c3e060946eb9740c43d8b2fbbd3334eddda76d152e74efdde9b9940581466865

    SHA512

    9d65bc2bfbfa891e1705b2d6f104268bb22d2d091dccb3c1af3a8aa02236475016b4714d2f20f18ee323a28533fa7a52696612f8abadbd398f94fae75de86c16

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    MD5

    d5542aa1b1aef9a4a496f6a9479d8e6d

    SHA1

    ee8e87aca4f06c30fd0b6dd1f537cb441c4073d9

    SHA256

    e47efbd13b9498eece7f4b7f32a562cec77a8b13ab07f40ec9025e082bf4c461

    SHA512

    7db27603c6d0c078ae1437ddd3e8e3f6e4a9c86826698d1f2146ba279b02f2c26bf7f9c801678432d838e7df4ab11c1c6744f45b2959120f52b0c66e59f8b632

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2D
    MD5

    3176fcaff5fa257231de82f4d634ceb4

    SHA1

    efe1624203b90ac87cd359daeb226b94f2ab289a

    SHA256

    66ddd871b23e3585773517578b9f62dd4c788ceec98da8830cf453e260c8317a

    SHA512

    bf165bd3a3bd23b292c67af4e2646c2f47bd4613d0f4534b7cd974a64b16fa127598b1ddb9311786763d9b7e6150aa172952220d5bb15e2ddb4867d56cd7a75f

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\HBPS4WXS\m[1].css
    MD5

    71cc62c87abf82e0aafbcc9661840dac

    SHA1

    8e9902b8044007e0382c3ad0bb2e13ce9cee8ad3

    SHA256

    11d80d1aee477e84c2eb00f9be0a08859e8a8df6d27b472342abc8a21bef3ebf

    SHA512

    e2ac63b1baea405fb035f8d9288fbcceb2654078ba9a777ba7c5d566ebfd0342284fffd0fa9fdf3eafca58f87e5da8058f58ca129a10df408e17e7ca3db8938d

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\HBPS4WXS\m[1].js
    MD5

    f725f5f6f90d07f051f8ff41dc8c0841

    SHA1

    90ede0196fb5294e738c1b0208f1a0145757ed38

    SHA256

    9d5a13239625d7419cdffe4732cd9b7a8b2362b25d422eeba22e419bca9adfc7

    SHA512

    713deb8d4ab3f0ccfef662aabb5ce4f54fb13930a50255cc5524cd4292f14dbf0c72e4dc8da93b11467dc71f4ded40eac0a3b52408d60a13cb2495f7695284ec

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\HBPS4WXS\m[2].js
    MD5

    e05ba06a6108ffa1fe2de8e3867bb64c

    SHA1

    4d0e7e06b4cc3799e2356b8429f65bc8dfa85908

    SHA256

    4011be1b2ee2ad856963929cef2a96abd086d745e6a74a95c19bd7d7a16f501b

    SHA512

    e2bab530d802d17e90a727d13575ac0a56a2790b5a3d8bc6372da5266908b3c1804279e63af2a9bb5894c94e452d54aae189ea6aae81fc6aeeb7f82074bd8ec1

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\OY8D4S7I\m[1].css
    MD5

    d4cc58a116037eb2aa1b7570bc345f82

    SHA1

    cd58b2aa66669d0a05e1d90ce8e394a3c56b1545

    SHA256

    dc91e7b723cfc82125a84009398bae215a1daa332bd51828c40e166eec8e798f

    SHA512

    de03f380a0177268c2c467cf9ffec18feed2987062e93e5d421fd017c3967665893d57885b14f40ccf1d9a492d089d30f393688cb8b52c7a0e347d3633aee846

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\OY8D4S7I\m[1].js
    MD5

    5412afc0a4478a1460a2d0a3383f8a3b

    SHA1

    a35b2d440bff2b03800ae7486ccfa7c9c417df0d

    SHA256

    88d7f5712b733305fb57c4d206582bb382cda72c09d000f07550303ab773530c

    SHA512

    cebd1949b4041142a953cef5004e88c3f84170add9c60301ecae301d558d32549d7f8f20fd7aa34ffd861bc15ea6a4af9e82c786d4f6a8e74be838867fa542fc

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\QT2UOKDP\m[1].css
    MD5

    77cd8a3bdd0088d3e5b3b71f54c75e20

    SHA1

    4c43c7b7c1808900ade3758678c05faed136ed71

    SHA256

    1208af0dab54414ec6f0077016c0a275b77a1c47507d8221e5157570eb05a288

    SHA512

    f61e5a6acf2f81a30d1476dc46be74a1d23dfc5327ae49565becb5fea0aaa27825730446eacd00b7b54e1f41013c04789b3ea4a3f116448577105fd584a1817a

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\CW61F525.cookie
    MD5

    2c2555054f6044c86d086c091f0212c5

    SHA1

    f9e48a311b9e9a729037303186e8bae4c242b8fd

    SHA256

    7d86ec042df5626131ed9ebf2a54e95c9b8006a3dc1f3245cd758df3bd8b0cbb

    SHA512

    71a77afa270442519c86b0b4514f3cd23406a9a9c58444b59c9627e163557ee4f577b4a029db5845a926bb74c084f6a46e48d1689037a66a2726828c81ec9fd7

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\FQQ1UUXG.cookie
    MD5

    ec68e05f0984b9b5e6fa55281dbdd15a

    SHA1

    7f8697e8fbeae495f04e1bc045d9a7fcf779b854

    SHA256

    49d45364e808d01d9b110320d47a2cdfa33eceb048503d06e15ec87a380c9695

    SHA512

    33eaed96d1d235b7b700c6fb07f23712ad2f022008cfd498789e310955249bfdf0a4309c935eef867b45a4f4e9d85f482dd30942afe1b40245fddc94d0e9fcdd

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\GEUODPEU.cookie
    MD5

    0143209081a4f413cbc652b4fa12b4a9

    SHA1

    3d8bb1e08a17677f06cd220c5b996007bb0f154c

    SHA256

    877900103fc13a97e5a0b2ab8fa1388cba48a53933899d4511d94e7475172c38

    SHA512

    d66c09c0d438b026ec95fff8451ede99e2d335c6d5ba0c3cdd08c3d36289000ffc12b40c9e82b604ef9b53e64d0baf0bf19090a7d0e173c05cb95ac452b6b702

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\GVPPZNFN.cookie
    MD5

    a9080a0ac9cc7decfa0515514c2d7bb5

    SHA1

    1abd7a39d35259874cb703c2a5cd1993a3587d19

    SHA256

    3eb35a83189667a986258d51862228ab0f3f31b05f1e8f74b972b642ac124b0a

    SHA512

    7c2185f801bcafb9ab0ad75b8ab4de21ebad74b9859d596135f08a7219b2790748f1dc6cd6b61395c93d28c66796c0f42047f7ccb21039caf3df460ca3466d48

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\RYDBQZV5.cookie
    MD5

    bc335f6fca9de0266a113b00275b57aa

    SHA1

    c1eb58c5516ddaf198d39f9f3bc2b908e7d3d7a1

    SHA256

    1ff3052fdd827848a90c8981a0e25cc3ad7678e1a123f65b3bb6e8b7022eb5a2

    SHA512

    4065ebb06143a42bac317e72bb9614687592d6eb7b5782a696deb2427cb3d879d8ca0d23533d87ce615e71e4e08544aed37a4c53270c60d382f2c5c9b3cd699f

  • memory/2392-115-0x00007FFF95B70000-0x00007FFF95BDB000-memory.dmp
    Filesize

    428KB

  • memory/2672-116-0x0000000000000000-mapping.dmp
  • memory/3460-128-0x0000000000000000-mapping.dmp