Resubmissions

14-10-2021 05:46

211014-ggprwagben 1

14-10-2021 05:42

211014-geh7bagbel 1

14-10-2021 05:39

211014-gchsrsgce4 1

14-10-2021 05:30

211014-f7lx8sgbdq 1

Analysis

  • max time kernel
    151s
  • max time network
    142s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    14-10-2021 05:42

General

  • Target

    http://sfwomenleaders.org

  • Sample

    211014-geh7bagbel

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 14 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http://sfwomenleaders.org
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:664
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:664 CREDAT:82945 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1960
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:664 CREDAT:148482 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:3872

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
    MD5

    62dfa95908bb144287ca1cfc58c0138c

    SHA1

    0a6fb48c00c2c972500151f4486bd55733106b95

    SHA256

    81627223119eee8ba0f9649466c6a3eabfe09406938c2685cfb31f1854ea84ee

    SHA512

    8dc5e05666d26e1bf5f6bc2a3d1aad32c776523e116b3b279bf827ca1a470cf2c0fab7713db6b0f587dc80bd8d22e491d34fadfdb4321ac5f5dc2bfc257eaa52

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    MD5

    0e7076d6b1e84aa724a64a4be6cbf7cc

    SHA1

    bc48c9a6ddbeae7ed1b9a6f7a5d98838205ff6fa

    SHA256

    4acfebfc4e9624bd192b338789d23c58deda34aa8de8db5a82163a38f818d0d7

    SHA512

    5f292e3e95eb259aacab30d9d2e6c1f1d7299b7de0a90e9f10db7d14f43035bf8c007190cdd28159ea6adfeb70f8086c79ab7b8ab4fab3593d30020f51f4c358

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
    MD5

    0ed3c7c8e119f2d82bd6624f4761d623

    SHA1

    f0897254ec55afa6053b4daa3ec3c5d8e407453d

    SHA256

    9195d7058c6df99eb807f15d91c3d32a5b0f5b39ad424193ab5c272bb64cfd7e

    SHA512

    e275d34ac159480db811b4114548c047e178481a0e8f2228cfe2d145102acda11e7019d976b5df3660f211146d4fea15b9a41fcfdf359b221c753dac4ad992df

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    MD5

    92d00e3a9633efb05044e8ad5db40a13

    SHA1

    a90c177f8d5f91f36a9030abe1bc247187b7cea0

    SHA256

    dd4ff3fdcc299789cbb73c9ead731b4bc6aef4b094edf82c5b270974529f6952

    SHA512

    eaf986ae640120ad57a132f4becfcd1ab71301bddf0795e3bb31b6b39254b74806286611dc5e0fb2ac194452fd4bae38ec26da96afe492b283423901897bd0d4

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\E90O5N7F.cookie
    MD5

    65cd83ae6e5855bab00b4242b3b6bcca

    SHA1

    38383ea6fe4570a93404a9a23e80f7410c8cf97a

    SHA256

    2c3362a36817f186b184d37712f64eba8ecbe775ab178ad3d1761e8952a290e6

    SHA512

    a13329b2b338b8dd5100fc1de8e569dbf12e0bd920ec337c3dfcb68a4f076d68849f62e07eb0f7adbfe2128599d0ce7c9f35bfc9117e76217abb71128de1b08f

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\LXOJSKGD.cookie
    MD5

    cb67c94c49737d74cb18c09232d52082

    SHA1

    f1f21bd6d81528d216183014c88af95986e5d5be

    SHA256

    2c5c03972a4a7c8fed3fa0819dc8b71ce15aa90a8d660a42a220efc714afc0c9

    SHA512

    e01fbf73e732b4c2e48fcd7f78ac1047fc2286f0395f9a0bfc329d7487a631eefb2a6c1589ce2cb26b6358c4cb4f860595bd6daaba8da1754cb550ff78a1afd0

  • memory/664-140-0x00007FFAE0360000-0x00007FFAE03CB000-memory.dmp
    Filesize

    428KB

  • memory/664-144-0x00007FFAE0360000-0x00007FFAE03CB000-memory.dmp
    Filesize

    428KB

  • memory/664-119-0x00007FFAE0360000-0x00007FFAE03CB000-memory.dmp
    Filesize

    428KB

  • memory/664-120-0x00007FFAE0360000-0x00007FFAE03CB000-memory.dmp
    Filesize

    428KB

  • memory/664-121-0x00007FFAE0360000-0x00007FFAE03CB000-memory.dmp
    Filesize

    428KB

  • memory/664-122-0x00007FFAE0360000-0x00007FFAE03CB000-memory.dmp
    Filesize

    428KB

  • memory/664-123-0x00007FFAE0360000-0x00007FFAE03CB000-memory.dmp
    Filesize

    428KB

  • memory/664-124-0x00007FFAE0360000-0x00007FFAE03CB000-memory.dmp
    Filesize

    428KB

  • memory/664-126-0x00007FFAE0360000-0x00007FFAE03CB000-memory.dmp
    Filesize

    428KB

  • memory/664-127-0x00007FFAE0360000-0x00007FFAE03CB000-memory.dmp
    Filesize

    428KB

  • memory/664-128-0x00007FFAE0360000-0x00007FFAE03CB000-memory.dmp
    Filesize

    428KB

  • memory/664-130-0x00007FFAE0360000-0x00007FFAE03CB000-memory.dmp
    Filesize

    428KB

  • memory/664-131-0x00007FFAE0360000-0x00007FFAE03CB000-memory.dmp
    Filesize

    428KB

  • memory/664-132-0x00007FFAE0360000-0x00007FFAE03CB000-memory.dmp
    Filesize

    428KB

  • memory/664-134-0x00007FFAE0360000-0x00007FFAE03CB000-memory.dmp
    Filesize

    428KB

  • memory/664-135-0x00007FFAE0360000-0x00007FFAE03CB000-memory.dmp
    Filesize

    428KB

  • memory/664-136-0x00007FFAE0360000-0x00007FFAE03CB000-memory.dmp
    Filesize

    428KB

  • memory/664-137-0x00007FFAE0360000-0x00007FFAE03CB000-memory.dmp
    Filesize

    428KB

  • memory/664-116-0x00007FFAE0360000-0x00007FFAE03CB000-memory.dmp
    Filesize

    428KB

  • memory/664-141-0x00007FFAE0360000-0x00007FFAE03CB000-memory.dmp
    Filesize

    428KB

  • memory/664-143-0x00007FFAE0360000-0x00007FFAE03CB000-memory.dmp
    Filesize

    428KB

  • memory/664-118-0x00007FFAE0360000-0x00007FFAE03CB000-memory.dmp
    Filesize

    428KB

  • memory/664-146-0x00007FFAE0360000-0x00007FFAE03CB000-memory.dmp
    Filesize

    428KB

  • memory/664-148-0x00007FFAE0360000-0x00007FFAE03CB000-memory.dmp
    Filesize

    428KB

  • memory/664-149-0x00007FFAE0360000-0x00007FFAE03CB000-memory.dmp
    Filesize

    428KB

  • memory/664-150-0x00007FFAE0360000-0x00007FFAE03CB000-memory.dmp
    Filesize

    428KB

  • memory/664-154-0x00007FFAE0360000-0x00007FFAE03CB000-memory.dmp
    Filesize

    428KB

  • memory/664-155-0x00007FFAE0360000-0x00007FFAE03CB000-memory.dmp
    Filesize

    428KB

  • memory/664-156-0x00007FFAE0360000-0x00007FFAE03CB000-memory.dmp
    Filesize

    428KB

  • memory/664-162-0x00007FFAE0360000-0x00007FFAE03CB000-memory.dmp
    Filesize

    428KB

  • memory/664-163-0x00007FFAE0360000-0x00007FFAE03CB000-memory.dmp
    Filesize

    428KB

  • memory/664-164-0x00007FFAE0360000-0x00007FFAE03CB000-memory.dmp
    Filesize

    428KB

  • memory/664-165-0x00007FFAE0360000-0x00007FFAE03CB000-memory.dmp
    Filesize

    428KB

  • memory/664-166-0x00007FFAE0360000-0x00007FFAE03CB000-memory.dmp
    Filesize

    428KB

  • memory/664-167-0x00007FFAE0360000-0x00007FFAE03CB000-memory.dmp
    Filesize

    428KB

  • memory/664-168-0x00007FFAE0360000-0x00007FFAE03CB000-memory.dmp
    Filesize

    428KB

  • memory/664-175-0x00007FFAE0360000-0x00007FFAE03CB000-memory.dmp
    Filesize

    428KB

  • memory/664-177-0x00007FFAE0360000-0x00007FFAE03CB000-memory.dmp
    Filesize

    428KB

  • memory/664-115-0x00007FFAE0360000-0x00007FFAE03CB000-memory.dmp
    Filesize

    428KB

  • memory/664-114-0x00007FFAE0360000-0x00007FFAE03CB000-memory.dmp
    Filesize

    428KB

  • memory/664-180-0x00007FFAE0360000-0x00007FFAE03CB000-memory.dmp
    Filesize

    428KB

  • memory/664-181-0x00007FFAE0360000-0x00007FFAE03CB000-memory.dmp
    Filesize

    428KB

  • memory/1960-139-0x0000000000000000-mapping.dmp
  • memory/3872-172-0x0000000000000000-mapping.dmp