Analysis

  • max time kernel
    121s
  • max time network
    133s
  • platform
    windows10_x64
  • resource
    win10-en-20210920
  • submitted
    11-10-2021 20:52

General

  • Target

    https://protonmail14245.lt.emlnk.com/Prod/link-tracker?notrack=1&redirectUrl=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&sig=BVwTv9igxH3LrZyY1GbGYLQfx6MQUQtCGAfVGsSAYvZo&iat=1633946508&a=477163247&account=protonmail14245%2Eactivehosted%2Ecom&email=pYSK1E%2F10CldpCu4Ef%2BzhwA3SuMkJhmkGexv49sZvNU%3D&s=bWFuYWdlbWVudHM5NjBAZ21haWwuY29t&i=1A3A1A5#Anslem.Obanor@etranzactng.com

  • Sample

    211011-znxeeaabc9

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 37 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://protonmail14245.lt.emlnk.com/Prod/link-tracker?notrack=1&redirectUrl=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&sig=BVwTv9igxH3LrZyY1GbGYLQfx6MQUQtCGAfVGsSAYvZo&iat=1633946508&a=477163247&account=protonmail14245%2Eactivehosted%2Ecom&email=pYSK1E%2F10CldpCu4Ef%2BzhwA3SuMkJhmkGexv49sZvNU%3D&s=bWFuYWdlbWVudHM5NjBAZ21haWwuY29t&i=1A3A1A5#Anslem.Obanor@etranzactng.com
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3612
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3612 CREDAT:82945 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:4380

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\9ZPATWY6.cookie
    MD5

    44584daf9e6d0482526d27d61b8d137c

    SHA1

    7cdece89717d4a865b86a78cb161df91fd992733

    SHA256

    de97ddf17afdab24535e474a453bd0bb4eeef6662878014641c6601c0e6ddd1b

    SHA512

    9eb15e60d44808fbc56b818e555a759c5eaba353b9de9b26e3618a8c02e122dec201f074ba1e3a2900b3062c0ae88ab26f965815cd74de2d3683d9db2dc37193

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\IFL1UQKO.cookie
    MD5

    2eb5f0510b53feb5018bf1709371d230

    SHA1

    621d10cd8271df610afb04770c93244a9e2375d5

    SHA256

    9b72ef69f7d135e89f8155c26d7de3552f75c22194cf0683b12c6125b3fc8abb

    SHA512

    7512b62e27c6413b808dbd7e1c87ec22265f57d46a9d82f14ca0faf768baa39e9a04dfb4e1867fd2ffeb3a9bcaa3bb24ed387473ca1a43bee99029e5530e5309

  • memory/3612-142-0x00007FFC0B190000-0x00007FFC0B1FB000-memory.dmp
    Filesize

    428KB

  • memory/3612-121-0x00007FFC0B190000-0x00007FFC0B1FB000-memory.dmp
    Filesize

    428KB

  • memory/3612-120-0x00007FFC0B190000-0x00007FFC0B1FB000-memory.dmp
    Filesize

    428KB

  • memory/3612-144-0x00007FFC0B190000-0x00007FFC0B1FB000-memory.dmp
    Filesize

    428KB

  • memory/3612-122-0x00007FFC0B190000-0x00007FFC0B1FB000-memory.dmp
    Filesize

    428KB

  • memory/3612-123-0x00007FFC0B190000-0x00007FFC0B1FB000-memory.dmp
    Filesize

    428KB

  • memory/3612-124-0x00007FFC0B190000-0x00007FFC0B1FB000-memory.dmp
    Filesize

    428KB

  • memory/3612-125-0x00007FFC0B190000-0x00007FFC0B1FB000-memory.dmp
    Filesize

    428KB

  • memory/3612-127-0x00007FFC0B190000-0x00007FFC0B1FB000-memory.dmp
    Filesize

    428KB

  • memory/3612-128-0x00007FFC0B190000-0x00007FFC0B1FB000-memory.dmp
    Filesize

    428KB

  • memory/3612-129-0x00007FFC0B190000-0x00007FFC0B1FB000-memory.dmp
    Filesize

    428KB

  • memory/3612-131-0x00007FFC0B190000-0x00007FFC0B1FB000-memory.dmp
    Filesize

    428KB

  • memory/3612-133-0x00007FFC0B190000-0x00007FFC0B1FB000-memory.dmp
    Filesize

    428KB

  • memory/3612-134-0x00007FFC0B190000-0x00007FFC0B1FB000-memory.dmp
    Filesize

    428KB

  • memory/3612-135-0x00007FFC0B190000-0x00007FFC0B1FB000-memory.dmp
    Filesize

    428KB

  • memory/3612-145-0x00007FFC0B190000-0x00007FFC0B1FB000-memory.dmp
    Filesize

    428KB

  • memory/3612-136-0x00007FFC0B190000-0x00007FFC0B1FB000-memory.dmp
    Filesize

    428KB

  • memory/3612-138-0x00007FFC0B190000-0x00007FFC0B1FB000-memory.dmp
    Filesize

    428KB

  • memory/3612-116-0x00007FFC0B190000-0x00007FFC0B1FB000-memory.dmp
    Filesize

    428KB

  • memory/3612-141-0x00007FFC0B190000-0x00007FFC0B1FB000-memory.dmp
    Filesize

    428KB

  • memory/3612-117-0x00007FFC0B190000-0x00007FFC0B1FB000-memory.dmp
    Filesize

    428KB

  • memory/3612-119-0x00007FFC0B190000-0x00007FFC0B1FB000-memory.dmp
    Filesize

    428KB

  • memory/3612-137-0x00007FFC0B190000-0x00007FFC0B1FB000-memory.dmp
    Filesize

    428KB

  • memory/3612-147-0x00007FFC0B190000-0x00007FFC0B1FB000-memory.dmp
    Filesize

    428KB

  • memory/3612-149-0x00007FFC0B190000-0x00007FFC0B1FB000-memory.dmp
    Filesize

    428KB

  • memory/3612-150-0x00007FFC0B190000-0x00007FFC0B1FB000-memory.dmp
    Filesize

    428KB

  • memory/3612-151-0x00007FFC0B190000-0x00007FFC0B1FB000-memory.dmp
    Filesize

    428KB

  • memory/3612-155-0x00007FFC0B190000-0x00007FFC0B1FB000-memory.dmp
    Filesize

    428KB

  • memory/3612-156-0x00007FFC0B190000-0x00007FFC0B1FB000-memory.dmp
    Filesize

    428KB

  • memory/3612-157-0x00007FFC0B190000-0x00007FFC0B1FB000-memory.dmp
    Filesize

    428KB

  • memory/3612-163-0x00007FFC0B190000-0x00007FFC0B1FB000-memory.dmp
    Filesize

    428KB

  • memory/3612-164-0x00007FFC0B190000-0x00007FFC0B1FB000-memory.dmp
    Filesize

    428KB

  • memory/3612-165-0x00007FFC0B190000-0x00007FFC0B1FB000-memory.dmp
    Filesize

    428KB

  • memory/3612-166-0x00007FFC0B190000-0x00007FFC0B1FB000-memory.dmp
    Filesize

    428KB

  • memory/3612-167-0x00007FFC0B190000-0x00007FFC0B1FB000-memory.dmp
    Filesize

    428KB

  • memory/3612-168-0x00007FFC0B190000-0x00007FFC0B1FB000-memory.dmp
    Filesize

    428KB

  • memory/3612-169-0x00007FFC0B190000-0x00007FFC0B1FB000-memory.dmp
    Filesize

    428KB

  • memory/3612-173-0x00007FFC0B190000-0x00007FFC0B1FB000-memory.dmp
    Filesize

    428KB

  • memory/3612-175-0x00007FFC0B190000-0x00007FFC0B1FB000-memory.dmp
    Filesize

    428KB

  • memory/3612-178-0x00007FFC0B190000-0x00007FFC0B1FB000-memory.dmp
    Filesize

    428KB

  • memory/3612-179-0x00007FFC0B190000-0x00007FFC0B1FB000-memory.dmp
    Filesize

    428KB

  • memory/3612-115-0x00007FFC0B190000-0x00007FFC0B1FB000-memory.dmp
    Filesize

    428KB

  • memory/4380-140-0x0000000000000000-mapping.dmp