Analysis

  • max time kernel
    131s
  • max time network
    144s
  • platform
    windows10_x64
  • resource
    win10-en-20210920
  • submitted
    15-10-2021 06:50

General

  • Target

    https://z67ljpg5u4.oihc.ca/?url=L2luZGV4LnBocD91cmw9aHR0cHMlM0ElMkYlMkZoYWxsb3dlZC1nbG93aW5nLXF1aWNrc2FuZC5nbGl0Y2gubWUlMkZpbmR5Lmh0bWw=/email/

  • Sample

    211015-hmdggabchn

Score
5/10

Malware Config

Signatures

  • Detected potential entity reuse from brand microsoft.
  • Modifies Internet Explorer settings 1 TTPs 41 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://z67ljpg5u4.oihc.ca/?url=L2luZGV4LnBocD91cmw9aHR0cHMlM0ElMkYlMkZoYWxsb3dlZC1nbG93aW5nLXF1aWNrc2FuZC5nbGl0Y2gubWUlMkZpbmR5Lmh0bWw=/email/
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2188
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2188 CREDAT:82945 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:3164

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_AD319D6DA1A11BC83AC8B4E4D3638231
    MD5

    b57de50f9cfecfe5e272f27e5569c298

    SHA1

    7a9c6458146f1742cc3c912014987640a23cb9cb

    SHA256

    3968828c5913eab063ec8dfa0ca340ecc03f80aa51b56076c4c699694f20b18a

    SHA512

    11572e809d0cae0a5f659a9aa1f5767f96aa18ff6a407f60e01d410662172f8ad872ce457ca7689c83a80707ab02e8405efccb989d02a83aa6884f0f4e0084f4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    MD5

    82fa88e64877afb41dca1c1538103ad6

    SHA1

    0c0b5efc26de2c5459845e1855750aea1a253338

    SHA256

    07bc4a1cb38272dc95952e6173fc9adc1cfea603c8cd5a0c9246564647437a8f

    SHA512

    a3844380c257120275bd30952fdca990327afdca4fcc55828624a57204e36d389a88b63e473eec7382047098565f08c90265563c5bf79e634fc60b2beb3e0e62

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\75CA58072B9926F763A91F0CC2798706_93E4B2BA79A897B3100CCB27F2D3BF4F
    MD5

    26585382a98ba596e84dc6c612dc05df

    SHA1

    abdc7c32c4c2bf31f9cc0740d25e9bfd57a37e96

    SHA256

    66994a075eb6a5de4319dbdea27a3dce80f19da00b9b74277d0b4ae2b622677b

    SHA512

    a2a9a2b3f76409c0265dbc3cb658d6995a48b17f4528064d312fa60af63c841c6765661aaa152c067fe88fb78830a5375e9e5f0b7a9d5fecbd1aa5278ad394e7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B66240B0F6C84BD4857ABA60CF5CE4A0_5043E0F5DF723415C9EECC201C838A62
    MD5

    1c1dce73f8f77041fb68d092d82abc9b

    SHA1

    73e47edbc1f9e90450de9bce05a413544b3226b0

    SHA256

    d5300da55742be618bbc4607bea8f598e5dac5f44508c4d6cf7c250a05724701

    SHA512

    0a536fb587fbfa4648ecb66bd0852c8703b82c56c2a1e572c344abf16537e728855fb7d43ca0acfbc1a8cd3ec7d1c91f5736318210dc15430fc09ed6095c2b77

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\BAD725C80F9E10846F35D039A996E4A8_88B6AE015495C1ECC395D19C1DD02894
    MD5

    772e05b42ec3366785d12d37d8b4c4bc

    SHA1

    483f8305c42a6f7cc2087d2ca8857f3a7c9642a1

    SHA256

    8b277daafd640db5a94e95eda0c5900f23f88fa190b50728c37ae99afdf2a100

    SHA512

    dafba008305ec3108e538a9a7dfc7a703183f886f2112f7317686d41d2eb2a53e7520833ca92f96ce6148c16dd962cfa860f276ad6bfea01471fe8859839394d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\FC5A820A001B41D68902E051F36A5282_30F701A5D3F3E340D2DF9758F7784007
    MD5

    57a4f1e4f8efda6c74242178a9f97bfb

    SHA1

    5df08d7064d8cd73aa47ece95fd4669463125fd5

    SHA256

    09c9b392adb3ed11eb18e16728532d46a235f501bcf3e9d323fbd51d6703c13d

    SHA512

    243d70946bd44b3c9d470826491b3531f7f7076675c7a8a6e331546d5f51bed4c79faca7763583e0eb8d9ec0be6fc1433e2aa0fe86d633757f7ef61b83b4d4dc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_AD319D6DA1A11BC83AC8B4E4D3638231
    MD5

    3ed802dce01aefb76f00a95c1a68e6c5

    SHA1

    8989f6aa0a57daabf05cd4afab386b271e09896c

    SHA256

    8270a7dad2af4ceec4817fc162bcf5ba7f59f1a3cb06af5e748ea7b89939b9af

    SHA512

    b496c7b1c8a66b91803c3240c3d8da77260d073d1e6b1b36e4640e13ecb75ae978df43d04f9ab621eedc29bde257d42849e7c4eef141121134477c2e2e4c0597

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    MD5

    a57f33722eadfbac6fad6814d60a706f

    SHA1

    ece8fc643b85ee184ce92a171d219cb8846f0b48

    SHA256

    2c58abf69992d4c5d0c381224d5e5767fa89d2a32eae1a5da5c74a9060c8a11c

    SHA512

    ba8e6f84f522ea7e4df560293071663d163dfc34ec14377a0dde3397b896204919861df2143b6a0c190ca94677c7e08242532e8ab104a0874ffbe2dd36869956

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\75CA58072B9926F763A91F0CC2798706_93E4B2BA79A897B3100CCB27F2D3BF4F
    MD5

    fdfdc4782fd37bbbd76853f28acd951a

    SHA1

    d297b644bd455538cbba5b3a4edd005f9c28d7a8

    SHA256

    7a9fa17c87160b2e19871e346be17a28ecee6de0316e40e54c57d31cf3db9688

    SHA512

    ee91cd6dabbd84890c2969beb6010e5abc5259ad4a3811617e6086b7cbed48baa56cff7b8053537c7cd89483cfa52048f9f4a038cbdedf4c5f1329d10c50747f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B66240B0F6C84BD4857ABA60CF5CE4A0_5043E0F5DF723415C9EECC201C838A62
    MD5

    722b15898f9ec8409d5df4c19f8e0cd7

    SHA1

    b5aee81c98a932a4f688312665a2a2cd599b44ec

    SHA256

    76a48b60b79634582ee497662634733126a179b2590794279108c0369699e31b

    SHA512

    24ebd3a16229533319ade74db5467d30848f391d56b00d16f2521de6a6d2fd12d7121bdf6e12753cc614fb23c4545a5ece932d18b33550507778d5d58e522622

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\BAD725C80F9E10846F35D039A996E4A8_88B6AE015495C1ECC395D19C1DD02894
    MD5

    c4689b25190c8fdbd9d1de23c50815ad

    SHA1

    bc42cfd064761704deaeff5be8091e139145670f

    SHA256

    a9e6cef9067f7c00e76b431858542d168f90e13fc9baa756e759c55c24d47748

    SHA512

    e0c1eb28bade6d3790e8cb14a7cf1593b04a96f524e0b9abb2375f19392f0439f6f411d42ce123c8d482f8c856aea4efa4db7ffc2087d8f307c2b252e19cc524

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\FC5A820A001B41D68902E051F36A5282_30F701A5D3F3E340D2DF9758F7784007
    MD5

    2e90de33d21aed1436af1b91d1709b1a

    SHA1

    70ec4e984cea69af51d5951f30a019e815bb5397

    SHA256

    c4783911da3257c4a88358a1a9bdd46fffbfe37f200d15d0205409dce5d0b3b9

    SHA512

    1d050fb8b5c6c300bb7097bca9f5f2ef95914a6fa4d14cfe5346f1097d503575eb3b543c0614bcad1ab467db95235368328e57b90f5c798cceb8aa1bc4ddc8e4

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\GYQNKGKI.cookie
    MD5

    74e816be590cbc4a960b2900fbb85f86

    SHA1

    5c07772228cd987fea172ecb91cab41fc8ab8f37

    SHA256

    da464c771a938a71e54a035dd9154ff32f4cab076e8dc7ebd27f3b4b6823d577

    SHA512

    d358d1abf6ba85e331d170f689f44739f6db75e0549097e518da32754a70e01f9c4995705a92a6962e336b5ca02561a42ab47ded9b26b8df244d4b99f5a5ec33

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\QFC5SXN2.cookie
    MD5

    37e94ee410f3343bd5141f6764a9ae1d

    SHA1

    0dfba6079695dd544f20de3107e62a9a49851e7a

    SHA256

    a03d2e46eebe0071ba1b015a1a3793464d128ebd14368a24f3a49abe674db5c7

    SHA512

    1ecd7ff0461181986351ad0b4c1add5be355a56d3fb90c12ea690a8cbf938d387d36475f44a68531dc0030da20bc7aa70fdf018866fa2f62b0198d8d6085118e

  • memory/2188-151-0x00007FFE0D270000-0x00007FFE0D2DB000-memory.dmp
    Filesize

    428KB

  • memory/2188-166-0x00007FFE0D270000-0x00007FFE0D2DB000-memory.dmp
    Filesize

    428KB

  • memory/2188-135-0x00007FFE0D270000-0x00007FFE0D2DB000-memory.dmp
    Filesize

    428KB

  • memory/2188-136-0x00007FFE0D270000-0x00007FFE0D2DB000-memory.dmp
    Filesize

    428KB

  • memory/2188-137-0x00007FFE0D270000-0x00007FFE0D2DB000-memory.dmp
    Filesize

    428KB

  • memory/2188-138-0x00007FFE0D270000-0x00007FFE0D2DB000-memory.dmp
    Filesize

    428KB

  • memory/2188-116-0x00007FFE0D270000-0x00007FFE0D2DB000-memory.dmp
    Filesize

    428KB

  • memory/2188-142-0x00007FFE0D270000-0x00007FFE0D2DB000-memory.dmp
    Filesize

    428KB

  • memory/2188-141-0x00007FFE0D270000-0x00007FFE0D2DB000-memory.dmp
    Filesize

    428KB

  • memory/2188-145-0x00007FFE0D270000-0x00007FFE0D2DB000-memory.dmp
    Filesize

    428KB

  • memory/2188-144-0x00007FFE0D270000-0x00007FFE0D2DB000-memory.dmp
    Filesize

    428KB

  • memory/2188-147-0x00007FFE0D270000-0x00007FFE0D2DB000-memory.dmp
    Filesize

    428KB

  • memory/2188-149-0x00007FFE0D270000-0x00007FFE0D2DB000-memory.dmp
    Filesize

    428KB

  • memory/2188-150-0x00007FFE0D270000-0x00007FFE0D2DB000-memory.dmp
    Filesize

    428KB

  • memory/2188-115-0x00007FFE0D270000-0x00007FFE0D2DB000-memory.dmp
    Filesize

    428KB

  • memory/2188-155-0x00007FFE0D270000-0x00007FFE0D2DB000-memory.dmp
    Filesize

    428KB

  • memory/2188-156-0x00007FFE0D270000-0x00007FFE0D2DB000-memory.dmp
    Filesize

    428KB

  • memory/2188-157-0x00007FFE0D270000-0x00007FFE0D2DB000-memory.dmp
    Filesize

    428KB

  • memory/2188-163-0x00007FFE0D270000-0x00007FFE0D2DB000-memory.dmp
    Filesize

    428KB

  • memory/2188-164-0x00007FFE0D270000-0x00007FFE0D2DB000-memory.dmp
    Filesize

    428KB

  • memory/2188-165-0x00007FFE0D270000-0x00007FFE0D2DB000-memory.dmp
    Filesize

    428KB

  • memory/2188-134-0x00007FFE0D270000-0x00007FFE0D2DB000-memory.dmp
    Filesize

    428KB

  • memory/2188-167-0x00007FFE0D270000-0x00007FFE0D2DB000-memory.dmp
    Filesize

    428KB

  • memory/2188-168-0x00007FFE0D270000-0x00007FFE0D2DB000-memory.dmp
    Filesize

    428KB

  • memory/2188-169-0x00007FFE0D270000-0x00007FFE0D2DB000-memory.dmp
    Filesize

    428KB

  • memory/2188-173-0x00007FFE0D270000-0x00007FFE0D2DB000-memory.dmp
    Filesize

    428KB

  • memory/2188-175-0x00007FFE0D270000-0x00007FFE0D2DB000-memory.dmp
    Filesize

    428KB

  • memory/2188-178-0x00007FFE0D270000-0x00007FFE0D2DB000-memory.dmp
    Filesize

    428KB

  • memory/2188-179-0x00007FFE0D270000-0x00007FFE0D2DB000-memory.dmp
    Filesize

    428KB

  • memory/2188-132-0x00007FFE0D270000-0x00007FFE0D2DB000-memory.dmp
    Filesize

    428KB

  • memory/2188-131-0x00007FFE0D270000-0x00007FFE0D2DB000-memory.dmp
    Filesize

    428KB

  • memory/2188-129-0x00007FFE0D270000-0x00007FFE0D2DB000-memory.dmp
    Filesize

    428KB

  • memory/2188-128-0x00007FFE0D270000-0x00007FFE0D2DB000-memory.dmp
    Filesize

    428KB

  • memory/2188-127-0x00007FFE0D270000-0x00007FFE0D2DB000-memory.dmp
    Filesize

    428KB

  • memory/2188-125-0x00007FFE0D270000-0x00007FFE0D2DB000-memory.dmp
    Filesize

    428KB

  • memory/2188-124-0x00007FFE0D270000-0x00007FFE0D2DB000-memory.dmp
    Filesize

    428KB

  • memory/2188-123-0x00007FFE0D270000-0x00007FFE0D2DB000-memory.dmp
    Filesize

    428KB

  • memory/2188-121-0x00007FFE0D270000-0x00007FFE0D2DB000-memory.dmp
    Filesize

    428KB

  • memory/2188-122-0x00007FFE0D270000-0x00007FFE0D2DB000-memory.dmp
    Filesize

    428KB

  • memory/2188-120-0x00007FFE0D270000-0x00007FFE0D2DB000-memory.dmp
    Filesize

    428KB

  • memory/2188-119-0x00007FFE0D270000-0x00007FFE0D2DB000-memory.dmp
    Filesize

    428KB

  • memory/2188-117-0x00007FFE0D270000-0x00007FFE0D2DB000-memory.dmp
    Filesize

    428KB

  • memory/3164-140-0x0000000000000000-mapping.dmp