Analysis

  • max time kernel
    402s
  • max time network
    412s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    14-10-2021 05:44

General

  • Target

    https://balsamiq.cloud/smrlp53/p3h3m3r/r2278?f=N4IgUiBcAMA0IDkpxAYWfAMhkAhHAsjgFo4DSUA2gLoC%2BQA%3D

  • Sample

    211014-gfj51agce6

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://balsamiq.cloud/smrlp53/p3h3m3r/r2278?f=N4IgUiBcAMA0IDkpxAYWfAMhkAhHAsjgFo4DSUA2gLoC%2BQA%3D
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:632
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:632 CREDAT:82945 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1660
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:632 CREDAT:148485 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1012

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
    MD5

    95eb153ab71ed3e32e273f6226a0008a

    SHA1

    108683d00851a4ecdb3741a904276ef8987a2c4c

    SHA256

    69b84090d24524943c1914bcff8dbe5aec6d022e76e4bff6e67d520c64d53b5e

    SHA512

    4f02756093bd09fa1901bc688d6005b186c325fbfe1278ee19d5b1050d5592b5acf223e0023e592d399442a739514b63a3caa1f04d5ae7edd8916be316755c63

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3374C26DD3823F20C63D795CA644C0F6
    MD5

    ac60cdf4b5121498c0e4787b429a188a

    SHA1

    0c505e9ad173d77e9b8e0e4aa7dd63a114dff65c

    SHA256

    3e31e24cc6834263b27fd36b088a979252fa3d224eed639761bc897f6b02ce37

    SHA512

    6d84f1128b46b16773bb93538916af83944898bb12f98fc87a44c3a7b7c69b8c2f185e06c2700e2ee6947fbd5aa2fa7449bcb9c2d73f33bcc836459ebc22f8a6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\75CA58072B9926F763A91F0CC2798706_93E4B2BA79A897B3100CCB27F2D3BF4F
    MD5

    af44cd8dd1c585c5db388bfd26a5c459

    SHA1

    8376c569aa72eea031ede6e6200ee026c2598f32

    SHA256

    d6fc312a96b1b66d46afb97f542d93211e2f5693f669deba316cd6e009dd03f4

    SHA512

    9f9ca2934b1a3a970ea391e32a9f7fbaed98748e8ec737afb18689d10846a3c305c4a2fb5f1f9481901eebaa3de31a9726d4d8f4f4a29192ffa7a71738312568

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_89854CA6A0F0936A4D2ECA78845CEA25
    MD5

    5fc9ec33db03bf03cbda288004160584

    SHA1

    51e643c88a193dc548ae9b611a6e9a21e01ba159

    SHA256

    56511b672945fbcef946b0bc0075448fc2f694877176c60d835302d459b97cf3

    SHA512

    b7580b6daa0de886c0b844ec187a345b7eb25e8c41da6953bfd8595a8f14b14609561464c1b2176b2dbd5a5fa19e51ecc6b0e30fcf95ef6c073557eb6f4132f4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B66240B0F6C84BD4857ABA60CF5CE4A0_5043E0F5DF723415C9EECC201C838A62
    MD5

    2510bbddf9486e206fdbe56ee953814e

    SHA1

    2b534f0336916f5b3339f4842aab0e5d9b4c18c4

    SHA256

    21297f36e41f0a8b970c862f2a05cb8c1a495dd24f19bb061145a9c40614975d

    SHA512

    ff561d3f6b695cceb0b65a4145ce8f97e9594c201129ac0790b3bd222e42209c0c5dab4bc7f6e2465dbca43b3797537a787101ad5f861d5588cefb12aedfee12

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\BAD725C80F9E10846F35D039A996E4A8_88B6AE015495C1ECC395D19C1DD02894
    MD5

    ff3df694cd51be99c83f966b3c35c2a5

    SHA1

    0d70ca644a89482d0c8f3b5df8d25f4eb41ae87e

    SHA256

    0356dd7ba43921e41616ece0b1337d81361acc86b9f4a9f8ea577450949c2766

    SHA512

    e1946df064fedc28751a6f72e0f43a017e7cc3858ef1c0c75dce03d2b69c632892ba6a0689b6ae5f0fe694ed19228d64b7f49292c475802bbfa49afdcdf247f7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
    MD5

    64e9b8bb98e2303717538ce259bec57d

    SHA1

    2b07bf8e0d831da42760c54feff484635009c172

    SHA256

    76bd459ec8e467efc3e3fb94cb21b9c77a2aa73c9d4c0f3faf823677be756331

    SHA512

    8980af4a87a009f1ae165182d1edd4ccbd12b40a5890de5dbaea4dbf3aeb86edffd58b088b1e35e12d6b1197cc0db658a9392283583b3cb24a516ebc1f736c56

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\D0E1C4B6144E7ECAB3F020E4A19EFC29_B5F77004C894173A10E3A199871D2D90
    MD5

    0a7f60f2f01132b41601bede8c414c34

    SHA1

    e028bfb04e59c8b375faba9cec559a6ae4a85c33

    SHA256

    83cbb3eff1cded893fe72ff87f15680b1cb4eadb0ed545fbe3fde3ae10454337

    SHA512

    37c8fb6126e000f4d13bfd231f5f4a9d59b88e12f0e0c3b7b8823a33e21a1c8a04b0bc6ede39415c3d737dbeda867cc477cd437bade66710e661057792ba0861

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F07644E38ED7C9F37D11EEC6D4335E02_BE9EEF936EC97838527255B8F50AE885
    MD5

    79f02180949394344c546f602ef7519a

    SHA1

    0ea518ce2e1a58cdeae963dc52a997ff95a8054b

    SHA256

    c0bb6be03138ac5581e0113456746889576823e381e523c7d08bdcca35abc6d7

    SHA512

    ec2a4729d46bdf3118bde26a3d3b6fdb3232f8e4a9f2580aebaa6f947ee854cdf8fdab69a51c24f303a4000094dccb1d91cd909b2f05a02c6929171a4469ed60

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\FC5A820A001B41D68902E051F36A5282_C50AE7BDAD133F393376576650C258B6
    MD5

    c9f7d6e959af1594677821b8b378e42a

    SHA1

    e275cb13376f4dbf164dac00abdaa82fa5714657

    SHA256

    705b8b7236e52bb162f333224a8516d1052ae32ee6381268710aabd3b3dce2fe

    SHA512

    d1b849e034a3471302bfceab561f21b76b187827fb990ef48c627f4b50d5c469868c7085f58fe8b81e6f6984839a4c52d933daf43d4fbf8901a8ce9da2866057

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
    MD5

    bafc546088f56bea4b66b149f0d45108

    SHA1

    c31c5d493352b36b412b78fd8d00823864f8a825

    SHA256

    a49d0a7b3b707d0f7bef935a70b0c83e4ba211606c8d9cec960ea47c78882bbe

    SHA512

    52f4b097a5490f02ce6263736ff5b7cd3a33095c72d1570f3bf7d1945784412f630a9d8bc627157c390573e95b23c3727b177f348e47de27f3c20326f1941057

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3374C26DD3823F20C63D795CA644C0F6
    MD5

    5a14056ac4126f5daeb7361e89b55375

    SHA1

    70ae005e260215861629bd80679b4a1e9df6f30e

    SHA256

    c8c3a7dad119e38c4b7fa68aed16cd7d6f5f7a2760bcf6b157f9f4bfb25b5c34

    SHA512

    dcb165bba9024e493ed0be4df38223cd03179e7c86f338c73a39beb6a7bcd5f440468541925fae8919be2de53767931ad5e766a1c6a63e3d6789111a47434c4d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\75CA58072B9926F763A91F0CC2798706_93E4B2BA79A897B3100CCB27F2D3BF4F
    MD5

    1e101bc0927ed02d55254d19e51edb4d

    SHA1

    2d5351e8253ee9da24a941f0ed54f2a745ba1f28

    SHA256

    2e78df35617bc13226241bfbedb795bd2262d994b874e84c9a48b4b7e0a6685b

    SHA512

    91b840f3e7b9853189d9590184da7483c5556ba303b78d2ca4ae91007bcbec6d9575214279efd6bcf9f401fe0e7ad59fabe9d81d4f297f4e9451b112f1d593f5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_89854CA6A0F0936A4D2ECA78845CEA25
    MD5

    3af997c420430853b111cc985a813eff

    SHA1

    cba0cd9ee87d273568d4fbf9dcf6e6bcc25bbaf2

    SHA256

    cc1bc2d3a4f3bc4bcc53bb088b99eee75ada35ce14042a4d13a5693a4b97adbb

    SHA512

    ef48acd5b0e8aedca52753af6ad3e0f04695c0be05a09081cf4f3b73dbe6684ca27188573ab6a6623c8c5727292ce3664bcfbdc7898803a8dd0fbf0c323a3649

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B66240B0F6C84BD4857ABA60CF5CE4A0_5043E0F5DF723415C9EECC201C838A62
    MD5

    019367a808898208660fb3ab34f8ad9f

    SHA1

    2703fa090f8675fd660dee269ed68f4bec6f53c3

    SHA256

    5dc9f211c0d029d2a11cdc217886df8be89c5548566117ef602b24548dcfc2e2

    SHA512

    2a78de0c0a03031d6611a93855f258c63e713962a2c674cf5942b9d01cf612cbbd32258575b581f5c61af4a89ed9b79bdcc7c7665b182543b7dc9229a839a8b7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\BAD725C80F9E10846F35D039A996E4A8_88B6AE015495C1ECC395D19C1DD02894
    MD5

    aa82447619378205e7c910309fe07f78

    SHA1

    0cedab8b6aa0c6fcf275f85852b0a3f7a1e270da

    SHA256

    5effbed19adf4b457cb82b9e5889deeab258aa20e3d91f4be0ff092d82841b68

    SHA512

    ea591e22a9ef1f85b08a8153f6738bbb7a4da8fd2feb4c9ae066545afcf147ad4c443fd385354e017a43a734b371fce4e538589569df2daf8e0dc81eb83616b9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
    MD5

    047ccfadf93933457a5bb1e6c303b3a4

    SHA1

    378894ee755e5ce0c43dbc155e47f8500040ebab

    SHA256

    3ebc065eeb499f9e05e59715634255720fa2af3c6c1532f9902d173dc6469017

    SHA512

    2a6761b8e375203280399ff92560dc3da444efa1542d9b7ef84ddb8b99e9fb91663844fd4f7a2de903c5399f4e4686ee4c70e2b8951fd531a533e30e25480649

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\D0E1C4B6144E7ECAB3F020E4A19EFC29_B5F77004C894173A10E3A199871D2D90
    MD5

    3415ed2686c8547d880c3a732a99fcc0

    SHA1

    30314d1af90587ae33d4b06c91d7fc00e43bae02

    SHA256

    2bc9743e2e88c68e76d7b681ae8aac39402c3c79df32c0b5619c9411de032ba1

    SHA512

    e61ca00b47e876cbdbd89c86463694d18148690b0c02ce5af814e2b36c0bac0c0d37ce674566d6a554425fda31db92dde2af275eb26a4dbcbe9bfca32fccec6b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F07644E38ED7C9F37D11EEC6D4335E02_BE9EEF936EC97838527255B8F50AE885
    MD5

    8cdf15cf668e1af1556e68feac7399f6

    SHA1

    f0f245777c76a54dd33c8e3e61696949ec030e97

    SHA256

    2fd727f64ffa0ec74b60b940022b06a8ac85a76255b8e485654426c9e380c8f9

    SHA512

    5affbc6641b4c436f732797c3d6e9a4023f34c90b4b562dc241f27b8939140d6cbc8e086ff472b8461f278d7caa46af001d4048d16aa0519f7bf99d987cec93a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\FC5A820A001B41D68902E051F36A5282_C50AE7BDAD133F393376576650C258B6
    MD5

    8ff0ce1975b1546c9dea03447ad220a2

    SHA1

    bdc82f12c88d73e3e086e909f50440cc82e96ccb

    SHA256

    0dcaca328b387fb1a7e552fbe4a32d1eb01e03be156a7c08a26c07330a1b5bc9

    SHA512

    3df755faa53d902e8f23304595ff3a7914ef4deed65433d04620af44dc191e7fbf770944d5a37ae66c7cb1f8301342afe6940c1dc7e769903e612acf27da97ad

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\E5CZ24XN.cookie
    MD5

    8a1fc90f14afa73fb0dbe4f6807a4f82

    SHA1

    d6be406a34daa60d16181611b2d672e783e562ce

    SHA256

    19ec92e3ff6b25739ecc45d0a336774252178bd615022b9c5d28d7a29d94eca5

    SHA512

    f2f33063c2f61f9b0de5968062a7b1053b04dd37840fe7d96302b8e68cfabfc91ab5c4d068a3d4c632d5d7bfbdfa14e2cc205eacbe2c6ccbbc7a6a1225302b87

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\EAWKKX3T.cookie
    MD5

    9222088bf04029270c59c3df67fc1843

    SHA1

    7fac145750170fd29985bc018a55e5b741b2264e

    SHA256

    caf8e3d3c07aa08828ae8596cde6bea73fda00af9ac36bed0f593047ef5f2be5

    SHA512

    51a2cac7bbe6f1526742fc59d9ba60cf84f5f3daaba3330c2938e26dd34795fc1213fc13205b0421942937856be548cd8322b0919d37000d193acb10ce7986f2

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\VBDKQLLC.cookie
    MD5

    4a28d3fe3aa130e3dfea1b80f9c73588

    SHA1

    1226be50deb84a4312e4a4626b925eedfa3512ae

    SHA256

    b09398160fe6bc591cce8da1a880a69bbd6dcff5d988d3c17e2617afdf8c5e46

    SHA512

    1c559b8f8895a704de9fbbfe758da83e81f66983c7054f489e140d86008e222a336414d9e45b2aef711248e6a728af587eb7906fa95de10cf290ca6dff923a27

  • memory/632-156-0x00007FFAF89D0000-0x00007FFAF8A3B000-memory.dmp
    Filesize

    428KB

  • memory/632-169-0x00007FFAF89D0000-0x00007FFAF8A3B000-memory.dmp
    Filesize

    428KB

  • memory/632-141-0x00007FFAF89D0000-0x00007FFAF8A3B000-memory.dmp
    Filesize

    428KB

  • memory/632-143-0x00007FFAF89D0000-0x00007FFAF8A3B000-memory.dmp
    Filesize

    428KB

  • memory/632-144-0x00007FFAF89D0000-0x00007FFAF8A3B000-memory.dmp
    Filesize

    428KB

  • memory/632-146-0x00007FFAF89D0000-0x00007FFAF8A3B000-memory.dmp
    Filesize

    428KB

  • memory/632-148-0x00007FFAF89D0000-0x00007FFAF8A3B000-memory.dmp
    Filesize

    428KB

  • memory/632-149-0x00007FFAF89D0000-0x00007FFAF8A3B000-memory.dmp
    Filesize

    428KB

  • memory/632-150-0x00007FFAF89D0000-0x00007FFAF8A3B000-memory.dmp
    Filesize

    428KB

  • memory/632-154-0x00007FFAF89D0000-0x00007FFAF8A3B000-memory.dmp
    Filesize

    428KB

  • memory/632-155-0x00007FFAF89D0000-0x00007FFAF8A3B000-memory.dmp
    Filesize

    428KB

  • memory/632-137-0x00007FFAF89D0000-0x00007FFAF8A3B000-memory.dmp
    Filesize

    428KB

  • memory/632-162-0x00007FFAF89D0000-0x00007FFAF8A3B000-memory.dmp
    Filesize

    428KB

  • memory/632-163-0x00007FFAF89D0000-0x00007FFAF8A3B000-memory.dmp
    Filesize

    428KB

  • memory/632-164-0x00007FFAF89D0000-0x00007FFAF8A3B000-memory.dmp
    Filesize

    428KB

  • memory/632-165-0x00007FFAF89D0000-0x00007FFAF8A3B000-memory.dmp
    Filesize

    428KB

  • memory/632-166-0x00007FFAF89D0000-0x00007FFAF8A3B000-memory.dmp
    Filesize

    428KB

  • memory/632-167-0x00007FFAF89D0000-0x00007FFAF8A3B000-memory.dmp
    Filesize

    428KB

  • memory/632-136-0x00007FFAF89D0000-0x00007FFAF8A3B000-memory.dmp
    Filesize

    428KB

  • memory/632-135-0x00007FFAF89D0000-0x00007FFAF8A3B000-memory.dmp
    Filesize

    428KB

  • memory/632-133-0x00007FFAF89D0000-0x00007FFAF8A3B000-memory.dmp
    Filesize

    428KB

  • memory/632-132-0x00007FFAF89D0000-0x00007FFAF8A3B000-memory.dmp
    Filesize

    428KB

  • memory/632-131-0x00007FFAF89D0000-0x00007FFAF8A3B000-memory.dmp
    Filesize

    428KB

  • memory/632-140-0x00007FFAF89D0000-0x00007FFAF8A3B000-memory.dmp
    Filesize

    428KB

  • memory/632-170-0x00007FFAF89D0000-0x00007FFAF8A3B000-memory.dmp
    Filesize

    428KB

  • memory/632-173-0x00007FFAF89D0000-0x00007FFAF8A3B000-memory.dmp
    Filesize

    428KB

  • memory/632-174-0x00007FFAF89D0000-0x00007FFAF8A3B000-memory.dmp
    Filesize

    428KB

  • memory/632-183-0x00007FFAF89D0000-0x00007FFAF8A3B000-memory.dmp
    Filesize

    428KB

  • memory/632-184-0x00007FFAF89D0000-0x00007FFAF8A3B000-memory.dmp
    Filesize

    428KB

  • memory/632-114-0x00007FFAF89D0000-0x00007FFAF8A3B000-memory.dmp
    Filesize

    428KB

  • memory/632-130-0x00007FFAF89D0000-0x00007FFAF8A3B000-memory.dmp
    Filesize

    428KB

  • memory/632-127-0x00007FFAF89D0000-0x00007FFAF8A3B000-memory.dmp
    Filesize

    428KB

  • memory/632-128-0x00007FFAF89D0000-0x00007FFAF8A3B000-memory.dmp
    Filesize

    428KB

  • memory/632-126-0x00007FFAF89D0000-0x00007FFAF8A3B000-memory.dmp
    Filesize

    428KB

  • memory/632-124-0x00007FFAF89D0000-0x00007FFAF8A3B000-memory.dmp
    Filesize

    428KB

  • memory/632-123-0x00007FFAF89D0000-0x00007FFAF8A3B000-memory.dmp
    Filesize

    428KB

  • memory/632-122-0x00007FFAF89D0000-0x00007FFAF8A3B000-memory.dmp
    Filesize

    428KB

  • memory/632-121-0x00007FFAF89D0000-0x00007FFAF8A3B000-memory.dmp
    Filesize

    428KB

  • memory/632-120-0x00007FFAF89D0000-0x00007FFAF8A3B000-memory.dmp
    Filesize

    428KB

  • memory/632-119-0x00007FFAF89D0000-0x00007FFAF8A3B000-memory.dmp
    Filesize

    428KB

  • memory/632-118-0x00007FFAF89D0000-0x00007FFAF8A3B000-memory.dmp
    Filesize

    428KB

  • memory/632-116-0x00007FFAF89D0000-0x00007FFAF8A3B000-memory.dmp
    Filesize

    428KB

  • memory/632-115-0x00007FFAF89D0000-0x00007FFAF8A3B000-memory.dmp
    Filesize

    428KB

  • memory/1012-188-0x0000000000000000-mapping.dmp
  • memory/1660-139-0x0000000000000000-mapping.dmp