Analysis

  • max time kernel
    142s
  • max time network
    164s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    11-10-2021 12:35

General

  • Target

    https://firebasestorage.googleapis.com/v0/b/project-1371461312878258304.appspot.com/o/565435465766446.html?alt=media&token=f1dd7309-5709-451c-8825-a6b98d412fc2#public-law@csl.mpg.de

  • Sample

    211011-psd4hshbc6

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 46 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://firebasestorage.googleapis.com/v0/b/project-1371461312878258304.appspot.com/o/565435465766446.html?alt=media&token=f1dd7309-5709-451c-8825-a6b98d412fc2#public-law@csl.mpg.de
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1704
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1704 CREDAT:82945 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1052
  • C:\Program Files\Mozilla Firefox\firefox.exe
    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3736.3.1560754628\2088642653" -childID 1 -isForBrowser -prefsHandle 2232 -prefMapHandle 2228 -prefsLen 204 -prefMapSize 219680 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 3736 "\\.\pipe\gecko-crash-server-pipe.3736" 2240 tab
    1⤵
      PID:1960
    • C:\Program Files\Mozilla Firefox\firefox.exe
      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3736.13.1943792652\1336559311" -childID 2 -isForBrowser -prefsHandle 2660 -prefMapHandle 2656 -prefsLen 1075 -prefMapSize 219680 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 3736 "\\.\pipe\gecko-crash-server-pipe.3736" 2720 tab
      1⤵
        PID:2388
      • C:\Program Files\Mozilla Firefox\firefox.exe
        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3736.20.1676798374\899115860" -childID 3 -isForBrowser -prefsHandle 3352 -prefMapHandle 3348 -prefsLen 7066 -prefMapSize 219680 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 3736 "\\.\pipe\gecko-crash-server-pipe.3736" 3364 tab
        1⤵
          PID:3264

        Network

        MITRE ATT&CK Matrix ATT&CK v6

        Defense Evasion

        Modify Registry

        1
        T1112

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
          MD5

          9f4de3adc8d3bd9e34df4a40e92dd3f0

          SHA1

          aaddabeb97f339edfcef64d3c45104db8709d5cb

          SHA256

          83f0abbfbb43b51b8d25aecb05e9e88bac2f0b08ac0f5f3f2187d1a44d4c9e74

          SHA512

          a48fa907c01718b30a3e8b12487f947b93f8115f3dad69c6ea372b5528f20cee55703ac6cd75b6589172bae507d11552c3091d9911199c4027ef6ab8e97ff064

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
          MD5

          64e9b8bb98e2303717538ce259bec57d

          SHA1

          2b07bf8e0d831da42760c54feff484635009c172

          SHA256

          76bd459ec8e467efc3e3fb94cb21b9c77a2aa73c9d4c0f3faf823677be756331

          SHA512

          8980af4a87a009f1ae165182d1edd4ccbd12b40a5890de5dbaea4dbf3aeb86edffd58b088b1e35e12d6b1197cc0db658a9392283583b3cb24a516ebc1f736c56

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F07644E38ED7C9F37D11EEC6D4335E02_BE9EEF936EC97838527255B8F50AE885
          MD5

          b577d4e24cbe9d88e03510b7bdf0a3a7

          SHA1

          520ed91aefac33c3950efc23025e75ea1a60172e

          SHA256

          26d84119290370b2daeee359a7312735b247ef4c93f56aaa362842c87723b2c9

          SHA512

          9fa349def288eb650c261773b409dc174e19e191a382c98100bdcc68bb4d64504d23b8caa71dadc654e3cd453bef3afedc9f5205adcb24e4d68996443b74be64

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
          MD5

          80e6bb2e14135fa265d4553402f596cf

          SHA1

          a07b4df0b72668f167cf04d77bc80967f7408852

          SHA256

          47591b9796f8ba7af81ab83e7f40331cc965347b345c31976bc87934272b9584

          SHA512

          172b7d747992dd35b80579d7b7db6bc2b0072c5debcc484c7b6bec304cc0cc3fdbe557dda44239f5d1ee64d74753553af9d00cca0036dfbd753e509a17f27a0a

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
          MD5

          30339b548784aaa562942bf25ab81c35

          SHA1

          04209e42e2ec1a31ca4d7d6a7a8a3fec41f23d3b

          SHA256

          9b7b6921e09566aef87258232d69a8e171ad0738e819d56beb03a876e975b200

          SHA512

          49f0fe4fed826ccd4ee11e15f48e405093631bc3611546c5f589c443b2e719eb01515b6f665acb2b8cb7f897647feb775b4aceb995236cc8b1c7457bed434be1

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F07644E38ED7C9F37D11EEC6D4335E02_BE9EEF936EC97838527255B8F50AE885
          MD5

          91d5ac51a735bd86b0737015d6924ac8

          SHA1

          1257709e2048a6ea04d0afa60242ee4804f884e0

          SHA256

          9cf67339ffe74e4853c92521e26c26a9e75c4379a1e4834b0f68529cc459668f

          SHA512

          7a4aebd932fb9ae015d4cbcdae4d67ec2afda015b82d80386b46eb3a6940099c6dc3414834158f1196d622ec481d124ed84ede1a55cce274497a58b56eabb01a

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\4TK91JNW.cookie
          MD5

          b43b8245917a0986aac51e3652bc5596

          SHA1

          befd0f02e9cab0726678f1994568659dd78f5926

          SHA256

          f3e0e6f9ed9d0628116aa820d289fb0efaef9834c84d8014879ea4fd31af9e51

          SHA512

          f7ec960e5a4461dc7d297e12051132c331de9f5a5bc2033e33c25d0d351094c8d4485e1195a6dfbdf81b20bb10b97e3659541523f0ab12d19aefa003471b6010

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\TN7JCHZA.cookie
          MD5

          bab1e6205698d761749301847deb1dde

          SHA1

          e2389213ded5e9682a929671a95bcaeb17ee6fb5

          SHA256

          d2e2ef345aec0847317ed57ce2a747e6013da07fd45330ff8e53dcbddd0c31cb

          SHA512

          b69fd1efe4c74f298647646e460306f12298f95f79e046173d80daacfc76a6ca0a415f44231973b85e17044084996a85588fb46db6bdae34aa5233fac53fc287

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\W1OCOP83.cookie
          MD5

          25527ab53039078255302685071f735c

          SHA1

          21c4c958349d99ba528eb0fabcc77d6100ad1d7d

          SHA256

          c02f6a3f72c98da702bb61322aec46f95bc125a6c3624ab755c3fd5aa91d3313

          SHA512

          8d809ea15e6b7b0ec35f18b3af1c3f12c00a5acbc10ea99a96dbb0e5d94040838430a4d2b242cf014d2e74a02d4eed111e7602dfc26da2df242c9243403d3817

        • memory/1052-139-0x0000000000000000-mapping.dmp
        • memory/1704-148-0x00007FFADE370000-0x00007FFADE3DB000-memory.dmp
          Filesize

          428KB

        • memory/1704-156-0x00007FFADE370000-0x00007FFADE3DB000-memory.dmp
          Filesize

          428KB

        • memory/1704-128-0x00007FFADE370000-0x00007FFADE3DB000-memory.dmp
          Filesize

          428KB

        • memory/1704-130-0x00007FFADE370000-0x00007FFADE3DB000-memory.dmp
          Filesize

          428KB

        • memory/1704-131-0x00007FFADE370000-0x00007FFADE3DB000-memory.dmp
          Filesize

          428KB

        • memory/1704-132-0x00007FFADE370000-0x00007FFADE3DB000-memory.dmp
          Filesize

          428KB

        • memory/1704-134-0x00007FFADE370000-0x00007FFADE3DB000-memory.dmp
          Filesize

          428KB

        • memory/1704-135-0x00007FFADE370000-0x00007FFADE3DB000-memory.dmp
          Filesize

          428KB

        • memory/1704-136-0x00007FFADE370000-0x00007FFADE3DB000-memory.dmp
          Filesize

          428KB

        • memory/1704-137-0x00007FFADE370000-0x00007FFADE3DB000-memory.dmp
          Filesize

          428KB

        • memory/1704-126-0x00007FFADE370000-0x00007FFADE3DB000-memory.dmp
          Filesize

          428KB

        • memory/1704-140-0x00007FFADE370000-0x00007FFADE3DB000-memory.dmp
          Filesize

          428KB

        • memory/1704-141-0x00007FFADE370000-0x00007FFADE3DB000-memory.dmp
          Filesize

          428KB

        • memory/1704-143-0x00007FFADE370000-0x00007FFADE3DB000-memory.dmp
          Filesize

          428KB

        • memory/1704-144-0x00007FFADE370000-0x00007FFADE3DB000-memory.dmp
          Filesize

          428KB

        • memory/1704-146-0x00007FFADE370000-0x00007FFADE3DB000-memory.dmp
          Filesize

          428KB

        • memory/1704-114-0x00007FFADE370000-0x00007FFADE3DB000-memory.dmp
          Filesize

          428KB

        • memory/1704-149-0x00007FFADE370000-0x00007FFADE3DB000-memory.dmp
          Filesize

          428KB

        • memory/1704-150-0x00007FFADE370000-0x00007FFADE3DB000-memory.dmp
          Filesize

          428KB

        • memory/1704-154-0x00007FFADE370000-0x00007FFADE3DB000-memory.dmp
          Filesize

          428KB

        • memory/1704-155-0x00007FFADE370000-0x00007FFADE3DB000-memory.dmp
          Filesize

          428KB

        • memory/1704-127-0x00007FFADE370000-0x00007FFADE3DB000-memory.dmp
          Filesize

          428KB

        • memory/1704-157-0x00007FFADE370000-0x00007FFADE3DB000-memory.dmp
          Filesize

          428KB

        • memory/1704-163-0x00007FFADE370000-0x00007FFADE3DB000-memory.dmp
          Filesize

          428KB

        • memory/1704-164-0x00007FFADE370000-0x00007FFADE3DB000-memory.dmp
          Filesize

          428KB

        • memory/1704-165-0x00007FFADE370000-0x00007FFADE3DB000-memory.dmp
          Filesize

          428KB

        • memory/1704-166-0x00007FFADE370000-0x00007FFADE3DB000-memory.dmp
          Filesize

          428KB

        • memory/1704-167-0x00007FFADE370000-0x00007FFADE3DB000-memory.dmp
          Filesize

          428KB

        • memory/1704-168-0x00007FFADE370000-0x00007FFADE3DB000-memory.dmp
          Filesize

          428KB

        • memory/1704-172-0x00007FFADE370000-0x00007FFADE3DB000-memory.dmp
          Filesize

          428KB

        • memory/1704-124-0x00007FFADE370000-0x00007FFADE3DB000-memory.dmp
          Filesize

          428KB

        • memory/1704-175-0x00007FFADE370000-0x00007FFADE3DB000-memory.dmp
          Filesize

          428KB

        • memory/1704-179-0x00007FFADE370000-0x00007FFADE3DB000-memory.dmp
          Filesize

          428KB

        • memory/1704-178-0x00007FFADE370000-0x00007FFADE3DB000-memory.dmp
          Filesize

          428KB

        • memory/1704-123-0x00007FFADE370000-0x00007FFADE3DB000-memory.dmp
          Filesize

          428KB

        • memory/1704-122-0x00007FFADE370000-0x00007FFADE3DB000-memory.dmp
          Filesize

          428KB

        • memory/1704-121-0x00007FFADE370000-0x00007FFADE3DB000-memory.dmp
          Filesize

          428KB

        • memory/1704-120-0x00007FFADE370000-0x00007FFADE3DB000-memory.dmp
          Filesize

          428KB

        • memory/1704-119-0x00007FFADE370000-0x00007FFADE3DB000-memory.dmp
          Filesize

          428KB

        • memory/1704-118-0x00007FFADE370000-0x00007FFADE3DB000-memory.dmp
          Filesize

          428KB

        • memory/1704-116-0x00007FFADE370000-0x00007FFADE3DB000-memory.dmp
          Filesize

          428KB

        • memory/1704-115-0x00007FFADE370000-0x00007FFADE3DB000-memory.dmp
          Filesize

          428KB