Analysis

  • max time kernel
    118s
  • max time network
    130s
  • platform
    windows10_x64
  • resource
    win10-en-20210920
  • submitted
    06-10-2021 18:38

General

  • Target

    https://sogepa.lt.emlnk.com/Prod/link-tracker?notrack=1&redirectUrl=aHR0cHMlM0ElMkYlMkY2MDAwMDIuc2VsY2RuLnJ1JTJGeGZhYmlvJTJGb3dhJTJGb3duZXcuaHRtbCUzRmxvZ2luLm1pY3Jvc29mdG9ubGluZS5jb20lMkZjb21tb24lMkZvYXV0aDIlMkZ2Mi4wJTJGbG9nb3V0JTNGcG9zdF9sb2dvdXRfcmVkaXJlY3RfdXJpJTNEaHR0cHMlMjUzQSUyNTJGJTI1MkZ3d3cub2ZmaWNlLmNvbSUyNTJGJTI2c3RhdGUlM0RmaF85dm4zTUo3d2RYTTRCSjZpYl9YX2d0aWtQZ0tiOGF1QVMzRWcyNXVYcndHdDRqSDl5WGJpdUZ2VzMzSXVIa0ZEQ1lQM2R0NmhfRnNucWp2SlBoM21TOUJJSGxBT25YQlo0UVpZcGJsRnVTNmc1cEd1SGlWTkNzZ3VudVdISCUyNngtY2xpZW50LVNLVSUzRElEX05FVFNUQU5EQVJEMl8wJTI2eC1jbGllbnQtdmVyJTNENi4xMS4wLjA=&sig=678BDTnsAi7vbwgJj9ocTo6eDmaw7KRSF85McR1vboTE&iat=1633521432&a=253732179&account=sogepa%2Eactivehosted%2Ecom&email=4LtAZ%2BCxvTU93rFu63%2FMDfFSkztVl1gWSBWcsWLQgqk%3D&s=2cd2dfec467f6a7e6945c1103b707133&i=4A6A1A11#[email protected]

  • Sample

    211006-xabvfabgdq

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 49 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://sogepa.lt.emlnk.com/Prod/link-tracker?notrack=1&redirectUrl=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&sig=678BDTnsAi7vbwgJj9ocTo6eDmaw7KRSF85McR1vboTE&iat=1633521432&a=253732179&account=sogepa%2Eactivehosted%2Ecom&email=4LtAZ%2BCxvTU93rFu63%2FMDfFSkztVl1gWSBWcsWLQgqk%3D&s=2cd2dfec467f6a7e6945c1103b707133&i=4A6A1A11#[email protected]
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3592
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3592 CREDAT:82945 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2208

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\709A8EC0F6D3194AD001E9041914421F_60179D6E33955BC3D863DDA528D5DB6D
    MD5

    370eb60e9f2cd0ac78d5d2e6c035d762

    SHA1

    78e4b3c882e3306e380bd8ccb383eaa14a074aa2

    SHA256

    e6bf710db8023db7cdbccba6d38cf3bfcc73ce3f0e67c5978df8d034d6fd0435

    SHA512

    114c4ace1094d26c2f58ae6bbb2fc3cff022d5b0a1f7ecc90e1855f9a881b5a2812582907cdfb55b78bf443b1b5ab07bcb9d9fb5ce8e8b2ab7efb47a8d80ec59

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_86C2A03C133240EC4C95180B9FD368BB
    MD5

    07b55ea13e5c48e1578bc7ea6dbc6518

    SHA1

    d6f02b98a5d6b936e5914503571f9b8604dac654

    SHA256

    497321864abc67805917fd6df95bc7f0407eead0db125477c7eaaf679833ba9d

    SHA512

    b412d43c0abf88048a6e1661af9ef32af2d4c04ac5ce3be6ffda35aa0664a04fb4d7633b63190127806e61f96c4bac5f50f6477ab27e266d841984be1a564bc3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    MD5

    dc34cc9727d7e94b8e3331515d4c51b9

    SHA1

    76669e23763505f37562efce970397cece194dcb

    SHA256

    4106455d3cc0646e27ff696ac2030db43b8291e06a33d4d5d179ef03425e1bfd

    SHA512

    8e858e38992c3b1b138bf3993ddfdca979bf865b032a878c3123aa232478f2e8bd5c006057387084870b02edb401fb1710d1b3c55db55278c74c548674fd4c5c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\709A8EC0F6D3194AD001E9041914421F_60179D6E33955BC3D863DDA528D5DB6D
    MD5

    c793ba5a141cf3fbf3eaad9ee9cbf644

    SHA1

    08679000d5679b6b5e6638eac846dc8430c7d918

    SHA256

    3ab59d241b80bc0e212fa6dfa50bb3a23e3c9df20ee730625f870cf78874ce10

    SHA512

    27c4164643903503eda9d7aca26e43583f4fb45dd938a730558158876e5b8dea5728c4bb5a1be5eb2e36ac1a8eed422060d7144dcb9142a5ec7e0edb7441e1d1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_86C2A03C133240EC4C95180B9FD368BB
    MD5

    c9b7b27b93739f9a2b16082796d0944d

    SHA1

    f532b403c8b68c910ee8631d9aebcdd34ce5a68a

    SHA256

    0bb770b5faabed3a13b179613fbf55e295e10d6b0d5a9be894ff2f81afe3c9cc

    SHA512

    7b9e9f7a4b153eb434bf4f9e6983a1fd869b40e045a9f63df58bab0633ac575b2465c4444cd88d375a5fb3708d9609cf792a5edabc361d2c3b0ebd92b7df79ea

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    MD5

    4476f16e452ee67247eea945770683a0

    SHA1

    77afcc75fa19cc8e59c8aa99c8b7e37770d1a589

    SHA256

    a7720409dbbabcfdc74ed7a8676bbc62d81ed9ad124949946fa01e7d87a2ae3e

    SHA512

    fbd8ff8d16ab70f9b05c2c89b321725567eeae6ac281597e3f33c3ae4f5e888d75c2624b678ee78c55fa4683e6ff04c517d9bd12f6de4b1ee93d125077505ab1

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\IF1QZU5Z.cookie
    MD5

    c93caaa7693540947ecc60b3c4fad5be

    SHA1

    423c6cfd72a326a682773ccd7e126b0c146a5aa8

    SHA256

    0fc9ffc2a3665763007774266a2e32f88802d197aca254a0dd115468fbc3145f

    SHA512

    a6644bb6e773926d278792fe8cbf2cc0c2372b721390465ee44e2bf399374e72568e8e7cb62cbea27a63aa25760338242e1f9ca7aa8022532c9eb4e2caaf5a76

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\WRZQGCMF.cookie
    MD5

    c829e9cb1a8852ea3a4240c46950e128

    SHA1

    fc0062ed537e855c5950401dfd154d7b6fc2b163

    SHA256

    74545d57151adb95cd098c0f9707b833b59da0ce3490a04a84433ce006dff8e8

    SHA512

    427834350a358de94cf846b4453db2bc783dad7fcdb11500347372d0ba32207f61dd4486cc08d70001e87bc680b73f6ebe504f59117c7a926b7306fe705a7929

  • memory/2208-116-0x0000000000000000-mapping.dmp
  • memory/3592-115-0x00007FFC0B190000-0x00007FFC0B1FB000-memory.dmp
    Filesize

    428KB