Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10_x64
  • resource
    win10-en-20210920
  • submitted
    04-10-2021 23:50

General

  • Target

    https://0sgm6.mjt.lu/lnk/AUYAADwj6a8AAAAAAAAAAAAIyIMAAAAAAtoAAAAAABoxEgBhWx_P2lTiF8zmQmOXR8JoQiDkRgAZR5M/1/UNpQ4f0aztsCa8ZSiEeRHg/aHR0cHM6Ly9hcmFic2FvdWRpLXNwbC04ZTVlMzEuaW5ncmVzcy1lYXJ0aC5lYXN5d3AuY29tL3NwbG9naW4vbG9nZmluYWw

  • Sample

    211004-3v2t9ahdar

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 49 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://0sgm6.mjt.lu/lnk/AUYAADwj6a8AAAAAAAAAAAAIyIMAAAAAAtoAAAAAABoxEgBhWx_P2lTiF8zmQmOXR8JoQiDkRgAZR5M/1/UNpQ4f0aztsCa8ZSiEeRHg/aHR0cHM6Ly9hcmFic2FvdWRpLXNwbC04ZTVlMzEuaW5ncmVzcy1lYXJ0aC5lYXN5d3AuY29tL3NwbG9naW4vbG9nZmluYWw
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1808
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1808 CREDAT:82945 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1896

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    MD5

    46cbd0a3d1e70a49db77aa1a79dea093

    SHA1

    e7ee6492153fcb7477c0512e14e923532940e066

    SHA256

    678c0747c7616857ed9abc64fa182ae2ff649167f322a11299b1119947f2f651

    SHA512

    8e11310cb6ea27c0aed73c29293fc3336e5445391063bc7e5a8b0443784a5a9919786386d950bdfe6f4e9cefb83f44a0ebeb400ddb1ed2ced0e16274f691784b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    MD5

    79aa6a453433f7beaed64481ca797db4

    SHA1

    8755706f915c96698a303fccf904cb2085a236df

    SHA256

    25211281068b09f525d24f8948a54f29f043ce9df52f40e9b69b69debba7c635

    SHA512

    e252d85491e104fe02db589bd3eb1af32007c61c339feef1560140bdb6a5924f876515faa3177f5e35ead12523b90ce1f7fa087c9790623f39e4e2a1cfc9d4ed

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\GVM9EGLW.cookie
    MD5

    a6bd466669d98436964268fc24690215

    SHA1

    eb7fbc3e2993e3f0eaa5e452f757cdfcd0f1ca97

    SHA256

    06a92ca6997d884ae6e119442a0e7373d6a6cae34a03c4e6db56b0cf61ea769c

    SHA512

    2f5f89e44bbbdcb3ab6ee55185283d2203e4352b909a09d950d314adec2e0c8b6a2e424ff29b7df3ed369496a830dbc8d05b824c28ebe1cd12ae5e6a1dccab7e

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\MXAP94M2.cookie
    MD5

    770b9e4cf3e6b98ab9c3c56ceb66dbf7

    SHA1

    7e0894f94a8167c10c70cb61fc714af3ffc5ade8

    SHA256

    e2585180f67ddd9d8ccda6a8a5bcfe68373291b38bd470dd91967e3003769576

    SHA512

    4e2b16d70b8a522cdcc56ac968152f10f0708d704fd837dbb7e2648f9b82eb8f4a0b7203c3f2615fa726cd4f920a9d21bf52b696696798ff415cd9c7c1653543

  • memory/1808-115-0x00007FFFA83A0000-0x00007FFFA840B000-memory.dmp
    Filesize

    428KB

  • memory/1896-116-0x0000000000000000-mapping.dmp