Analysis

  • max time kernel
    151s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-ja-20210920
  • submitted
    30-09-2021 23:52

General

  • Target

    http://hillmag.xyz/

  • Sample

    210930-3w5mjaafdj

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 43 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http://hillmag.xyz/
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1560
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1560 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:812
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1560 CREDAT:340994 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1688
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1560 CREDAT:996372 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1716

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
    MD5

    ab5c36d10261c173c5896f3478cdc6b7

    SHA1

    87ac53810ad125663519e944bc87ded3979cbee4

    SHA256

    f8e90fb0557fe49d7702cfb506312ac0b24c97802f9c782696db6d47f434e8e9

    SHA512

    e83e4eae44e7a9cbcd267dbfc25a7f4f68b50591e3bbe267324b1f813c9220d565b284994ded5f7d2d371d50e1ebfa647176ec8de9716f754c6b5785c6e897fa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    MD5

    eb730f508e03d3764a5d8f6288703831

    SHA1

    ecf31204189b2aab8143db96efb4ef94ce9ea05b

    SHA256

    ed7264c2c04d9de8d387972aca8ba11a97a2ca9904e7b79ee647d26f0d9b718d

    SHA512

    0728c03016aed70c9b46a21537a94b09b9861614884b934e9e9d26dca69b694ae159afae3c5661f825c4cc37b50f433161879d3f25d9d971f8b4f923bb44f91e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    MD5

    48ed9a66f955d6dc766b9d418dd8da6a

    SHA1

    28959dd73f5a0a30ca2ff05fa850c96d7b11fd49

    SHA256

    72896d189b0e5c48adab267bd84371cdec72e8f1fec161c9f8f9a8d096e4f577

    SHA512

    9fd003db350deed37bf4f35f4a538786efcdcb16fb5a87526911d933af0f00e7616629dca3751b6fbc73ee2d85c4750f5dc05ea233707af0f7654d6241749613

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\20FS0QLA\ORWF1TEV.htm
    MD5

    d19fa77934d1d0f3d8a69b37a5563eed

    SHA1

    6418c49a0e322400d6731bd874858b812a6e4183

    SHA256

    2d33a6cfee719d2fca5ae7f563a0013bdcbf194299f4fc2588d8e6fb5bf92099

    SHA512

    f703adc07b407554b62ca568ade85d05675f15fce44233ada9842c18a85595a5ef4a050436219424db54b6322c81f10359f2a273b4e97ec17e81dbe3e40973a5

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\324ZA0K5\QVGZLR7P.htm
    MD5

    5044b7c97e81b5f69585186a1823c403

    SHA1

    17a75e96542a16cebbbbb39fe2bea02cc2c29896

    SHA256

    3959a6824363a542b714c7e29e8416e8470df0c39c770b3508b2b83544c226bf

    SHA512

    d74db25a7ede3fb18032e03af49dcb46d3882bda7eadedd38ed306bc3c800fbd119065d51e62ab05bbcc405f9b8cf73a7c640eda048309052f6205837308fca9

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\SX6GLBVL.txt
    MD5

    8d60f4ba76cda97c27b223c9a066b287

    SHA1

    b97dda1be797bde88f63da47dd2b1cd698b107a9

    SHA256

    62f669c42377c336230abb1c23892568575543321d3977782bf2a51a4da01993

    SHA512

    3de2f6b0648676b4c4ce39626ad9cea36c575754825bbbb3521e939347e58d265d8acc7fa46e7abc4f28bb9022f22ff7e88d155f2282607a27d6a520b0f281e5

  • memory/812-54-0x0000000000000000-mapping.dmp
  • memory/1688-59-0x0000000000000000-mapping.dmp
  • memory/1688-60-0x0000000075741000-0x0000000075743000-memory.dmp
    Filesize

    8KB

  • memory/1716-62-0x0000000000000000-mapping.dmp
  • memory/1716-64-0x0000000000D70000-0x0000000000D72000-memory.dmp
    Filesize

    8KB