Analysis

  • max time kernel
    150s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-de-20210920
  • submitted
    30-09-2021 23:52

General

  • Target

    http://hillmag.xyz/

  • Sample

    210930-3w5mjaafdj

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http://hillmag.xyz/
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1724
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1724 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1320

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
    MD5

    ab5c36d10261c173c5896f3478cdc6b7

    SHA1

    87ac53810ad125663519e944bc87ded3979cbee4

    SHA256

    f8e90fb0557fe49d7702cfb506312ac0b24c97802f9c782696db6d47f434e8e9

    SHA512

    e83e4eae44e7a9cbcd267dbfc25a7f4f68b50591e3bbe267324b1f813c9220d565b284994ded5f7d2d371d50e1ebfa647176ec8de9716f754c6b5785c6e897fa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    MD5

    29a9c289f0a6d52e9cfe65ff272c053e

    SHA1

    e00cb22bab6ccdc4a11955b195b8170cd16afb24

    SHA256

    d988101c6777d2eed20da6a61aeac83b7fa086b5cefc2351b270be2d08f4bea1

    SHA512

    fe0c16912d26ec894cf07c3d2d38c5b8c1b6b089ef0a6596a7b349abce1682acecbfd98c3345e78a9c8d4afe2173e702d8002ef9bd951b67d07230ca4d0a4b8b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    MD5

    cb5bd920a818cf5f2ac421406cf25330

    SHA1

    fb306ca6875caa18df9deaabe9f34a315fd2887c

    SHA256

    5abacad3647361eaf81d7b71a4cdbe882047aafc7508bd3d99347d7cb87eeccb

    SHA512

    5ef5b29f1a67ca184f049e7b818645e583c2a80025295d7b684e68c28d544ce727be4a00bb772f54eebfed187bdf77fd702c9c12fbaed1b33f81d95880b7d4ed

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\QWNJH8ID.txt
    MD5

    c89e3a6bbea6bf2c3b35d07db3b9ba91

    SHA1

    8360f8f7d838f12b7725637ff5ee59581d2be76c

    SHA256

    1f22a12bf1d3f09a9901188cd06943d61318390819c26b1fb834f436303491dd

    SHA512

    9b8d86976ea38a9d5f2aff1792aa85e30a7a0cd650371b35c7d06294f1d4f7e4929b6d29d9ea8eea0643618a9861b6f866dada9fe7b42bc60fc6939a27b00684

  • memory/1320-53-0x0000000000000000-mapping.dmp
  • memory/1320-54-0x0000000076391000-0x0000000076393000-memory.dmp
    Filesize

    8KB