Analysis

  • max time kernel
    109s
  • max time network
    144s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    04-10-2021 14:15

General

  • Target

    http://server266.web-hosting.com.shared4.xyz/cgi-bin2/mail/inbox/quota/index.php?user=toto.com&[email protected]

  • Sample

    211004-rksm2sgecn

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 49 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http://server266.web-hosting.com.shared4.xyz/cgi-bin2/mail/inbox/quota/index.php?user=toto.com&[email protected]
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:652
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:652 CREDAT:82945 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:312

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    MD5

    46cbd0a3d1e70a49db77aa1a79dea093

    SHA1

    e7ee6492153fcb7477c0512e14e923532940e066

    SHA256

    678c0747c7616857ed9abc64fa182ae2ff649167f322a11299b1119947f2f651

    SHA512

    8e11310cb6ea27c0aed73c29293fc3336e5445391063bc7e5a8b0443784a5a9919786386d950bdfe6f4e9cefb83f44a0ebeb400ddb1ed2ced0e16274f691784b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    MD5

    ffe677b1a388d330ec555cff5de067c2

    SHA1

    5bca70e4220d6467bdd2aac22a4217b76357425b

    SHA256

    26bea7fd7a2333cc2d6770cfeec2db3a9ca4030731cdc0a81055fdee04eb2149

    SHA512

    66d07e34a1fd19d24297295ce0af979e4858a0c311bcb0f2a3a6c8715cd7bce26cd165800698db0d26c77a50c3d70e1a0647c77890c5167fe735432d24a102d7

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\20BC1DPO.cookie
    MD5

    225f049d4f47114b9b072050090c19a5

    SHA1

    c21e4cde246d8b1db05993ce597bb0a65ad64e06

    SHA256

    1f8e8d7497ea203895eaae2402e082b431422bd75c1bb8d4d6dd572637e9c41e

    SHA512

    c1296208a0d9387a3de33a2220d7228427ad8d72c0f5aefbeaeee7d3686c7646b0a4f328d64fc83a64e8c987062230c917c5bcbfe3e930ebf061f760ab7afeea

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\FE50U63Q.cookie
    MD5

    b83c9b428f33906c7cccddb3001b9f9f

    SHA1

    97e2d4e2fe86a67093ffab6cf69818235b9363a2

    SHA256

    3bb641fa6f74f90452fb32bb60eecb8849f1f97cced27c43a00ffd04725af74c

    SHA512

    e73dc003ee51d7bab6a437bf350f63b9838aaa7aecbe57568db9ea831f0f5956fc888f497504695864da18b61d801cd29f1a9a1d5d166ab3cd7bede602e2588e

  • memory/312-115-0x0000000000000000-mapping.dmp
  • memory/652-114-0x00007FFDED020000-0x00007FFDED08B000-memory.dmp
    Filesize

    428KB