Analysis

  • max time kernel
    132s
  • max time network
    134s
  • platform
    windows10_x64
  • resource
    win10-en-20210920
  • submitted
    12-10-2021 14:25

General

  • Target

    https://lekarica.com/354/login.php?cmd=login_submit&id=2ed9db7e9f4cc61a3775386ecd4913eb2ed9db7e9f4cc61a3775386ecd4913eb&session=2ed9db7e9f4cc61a3775386ecd4913eb2ed9db7e9f4cc61a3775386ecd4913eb

  • Sample

    211012-rrdsgacec6

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://lekarica.com/354/login.php?cmd=login_submit&id=2ed9db7e9f4cc61a3775386ecd4913eb2ed9db7e9f4cc61a3775386ecd4913eb&session=2ed9db7e9f4cc61a3775386ecd4913eb2ed9db7e9f4cc61a3775386ecd4913eb
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3608
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3608 CREDAT:82945 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:4596

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751
    MD5

    54e9306f95f32e50ccd58af19753d929

    SHA1

    eab9457321f34d4dcf7d4a0ac83edc9131bf7c57

    SHA256

    45f94dceb18a8f738a26da09ce4558995a4fe02b971882e8116fc9b59813bb72

    SHA512

    8711a4d866f21cdf4d4e6131ec4cfaf6821d0d22b90946be8b5a09ab868af0270a89bc326f03b858f0361a83c11a1531b894dfd1945e4812ba429a7558791f4f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7A3112A66298E38C7207F8F0E3E5A311
    MD5

    3ee55ba607b0c796c72d9e5346b7bdc0

    SHA1

    464d11aaa1affb982bd4d073022872dbe3ec9d13

    SHA256

    0afee977f1c97bc23818aec9ef38b83e8d47c7ff78493609916c2a9649d41c07

    SHA512

    72e8429da660ab58441e924eed852356953251548f3d2000e2dd4cd5f7df8d6b3de2d709ddd4b1298c555d761ddf519a524bfae2aaa8772b29e3b83645f51d5e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751
    MD5

    ba9c8209107fe967ee3667d67c4d944c

    SHA1

    41305555db3727a2da234925033b367d61a83641

    SHA256

    151a0e686721969212d49ae3de54e78f07813f24d8467cdfc320bda2d1e88477

    SHA512

    fa8df4bc13efab707487d9dc4daa10f6c69b44bbd87c4bd597b9371010f503c9b94803191bd163f4e9b98f69ac51291096d8b0f28c1e2f0e8cdf44293d824374

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7A3112A66298E38C7207F8F0E3E5A311
    MD5

    bc81b27211ac4ef7185a3dbba6cba837

    SHA1

    a6bc5d327fe92995b8286fc465a06c7ff7b4306c

    SHA256

    c9ea4087a5018bbe348ea8f084d9f30c61a0465fcbe16fac2fa4784c2478cd75

    SHA512

    8d9e890e847fb43a0b8193aad52830e13dada8717df2c40d13685b2b6a5d6d6fc707e12a195bdfd47f4cb90305b2a203d407a8b7eb8890e5f02e3445885af1ee

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\T5WU2FB0.cookie
    MD5

    ef41c791e8535840583adc091eb50648

    SHA1

    2b0773ed434046eb0149cafd28aa5b2132d6c9ac

    SHA256

    35ef697529f277ae6eb3ff80fae04ae96aede772bc94a61460bebc28f867e7eb

    SHA512

    041992cc389686c6deff60a4165d572e7e7f2eae0c20b05f97b00ced391b4de86e3f1582dabf9eb27eba32da070b4998901297b1653863f9f3058bf9bc93d8ca

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\TQOXP2BF.cookie
    MD5

    53c0a0ad30cdc69c758e0f6e5c5827b0

    SHA1

    3f8abb6468ac1a3eb44d65697c9a7234ef184ef7

    SHA256

    bc3e67feec28f5e83399bfe12209959a00ec6f4e2dc5f6d5984124bd34ee39a1

    SHA512

    98a671f1bbcd5d52370418deb6fc7671c7022d87d935ede1cb135d66a9ccc68a93ae675f12f588cf1c9785cf6e1de7319cb0f375499707f844e187eea75c56e8

  • memory/3608-145-0x00007FFC08570000-0x00007FFC085DB000-memory.dmp
    Filesize

    428KB

  • memory/3608-150-0x00007FFC08570000-0x00007FFC085DB000-memory.dmp
    Filesize

    428KB

  • memory/3608-124-0x00007FFC08570000-0x00007FFC085DB000-memory.dmp
    Filesize

    428KB

  • memory/3608-125-0x00007FFC08570000-0x00007FFC085DB000-memory.dmp
    Filesize

    428KB

  • memory/3608-127-0x00007FFC08570000-0x00007FFC085DB000-memory.dmp
    Filesize

    428KB

  • memory/3608-128-0x00007FFC08570000-0x00007FFC085DB000-memory.dmp
    Filesize

    428KB

  • memory/3608-129-0x00007FFC08570000-0x00007FFC085DB000-memory.dmp
    Filesize

    428KB

  • memory/3608-131-0x00007FFC08570000-0x00007FFC085DB000-memory.dmp
    Filesize

    428KB

  • memory/3608-133-0x00007FFC08570000-0x00007FFC085DB000-memory.dmp
    Filesize

    428KB

  • memory/3608-134-0x00007FFC08570000-0x00007FFC085DB000-memory.dmp
    Filesize

    428KB

  • memory/3608-135-0x00007FFC08570000-0x00007FFC085DB000-memory.dmp
    Filesize

    428KB

  • memory/3608-136-0x00007FFC08570000-0x00007FFC085DB000-memory.dmp
    Filesize

    428KB

  • memory/3608-137-0x00007FFC08570000-0x00007FFC085DB000-memory.dmp
    Filesize

    428KB

  • memory/3608-138-0x00007FFC08570000-0x00007FFC085DB000-memory.dmp
    Filesize

    428KB

  • memory/3608-116-0x00007FFC08570000-0x00007FFC085DB000-memory.dmp
    Filesize

    428KB

  • memory/3608-141-0x00007FFC08570000-0x00007FFC085DB000-memory.dmp
    Filesize

    428KB

  • memory/3608-142-0x00007FFC08570000-0x00007FFC085DB000-memory.dmp
    Filesize

    428KB

  • memory/3608-144-0x00007FFC08570000-0x00007FFC085DB000-memory.dmp
    Filesize

    428KB

  • memory/3608-115-0x00007FFC08570000-0x00007FFC085DB000-memory.dmp
    Filesize

    428KB

  • memory/3608-147-0x00007FFC08570000-0x00007FFC085DB000-memory.dmp
    Filesize

    428KB

  • memory/3608-149-0x00007FFC08570000-0x00007FFC085DB000-memory.dmp
    Filesize

    428KB

  • memory/3608-123-0x00007FFC08570000-0x00007FFC085DB000-memory.dmp
    Filesize

    428KB

  • memory/3608-151-0x00007FFC08570000-0x00007FFC085DB000-memory.dmp
    Filesize

    428KB

  • memory/3608-155-0x00007FFC08570000-0x00007FFC085DB000-memory.dmp
    Filesize

    428KB

  • memory/3608-156-0x00007FFC08570000-0x00007FFC085DB000-memory.dmp
    Filesize

    428KB

  • memory/3608-157-0x00007FFC08570000-0x00007FFC085DB000-memory.dmp
    Filesize

    428KB

  • memory/3608-163-0x00007FFC08570000-0x00007FFC085DB000-memory.dmp
    Filesize

    428KB

  • memory/3608-164-0x00007FFC08570000-0x00007FFC085DB000-memory.dmp
    Filesize

    428KB

  • memory/3608-166-0x00007FFC08570000-0x00007FFC085DB000-memory.dmp
    Filesize

    428KB

  • memory/3608-165-0x00007FFC08570000-0x00007FFC085DB000-memory.dmp
    Filesize

    428KB

  • memory/3608-167-0x00007FFC08570000-0x00007FFC085DB000-memory.dmp
    Filesize

    428KB

  • memory/3608-168-0x00007FFC08570000-0x00007FFC085DB000-memory.dmp
    Filesize

    428KB

  • memory/3608-169-0x00007FFC08570000-0x00007FFC085DB000-memory.dmp
    Filesize

    428KB

  • memory/3608-173-0x00007FFC08570000-0x00007FFC085DB000-memory.dmp
    Filesize

    428KB

  • memory/3608-175-0x00007FFC08570000-0x00007FFC085DB000-memory.dmp
    Filesize

    428KB

  • memory/3608-176-0x00007FFC08570000-0x00007FFC085DB000-memory.dmp
    Filesize

    428KB

  • memory/3608-179-0x00007FFC08570000-0x00007FFC085DB000-memory.dmp
    Filesize

    428KB

  • memory/3608-122-0x00007FFC08570000-0x00007FFC085DB000-memory.dmp
    Filesize

    428KB

  • memory/3608-121-0x00007FFC08570000-0x00007FFC085DB000-memory.dmp
    Filesize

    428KB

  • memory/3608-120-0x00007FFC08570000-0x00007FFC085DB000-memory.dmp
    Filesize

    428KB

  • memory/3608-119-0x00007FFC08570000-0x00007FFC085DB000-memory.dmp
    Filesize

    428KB

  • memory/3608-117-0x00007FFC08570000-0x00007FFC085DB000-memory.dmp
    Filesize

    428KB

  • memory/4596-140-0x0000000000000000-mapping.dmp