Analysis

  • max time kernel
    128s
  • max time network
    156s
  • platform
    windows10_x64
  • resource
    win10-en-20210920
  • submitted
    17-10-2021 21:05

General

  • Target

    https://forum.daffodil-bd.com/Template/img/softs/-/volkbank/?r=2341

  • Sample

    211017-zw9ppsdgcq

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 47 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://forum.daffodil-bd.com/Template/img/softs/-/volkbank/?r=2341
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1684
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1684 CREDAT:82945 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:3328

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    MD5

    6cc161dfa552b32b57ffb217c3c4e718

    SHA1

    a0a9a1d6c6815cf9e7148386659b99630c0a6c59

    SHA256

    0f2f73b237fc7b973f14aa1b9407d2a3cf90b78223e6a219b0dc1e784761352a

    SHA512

    98887974d9c9f39d981cb90abaf7cc07cc8a97249dfa6c3ae4015042053ef9563fe7231816b6d7a0b6c9ae26870a539961576344114b76356ef93fd98c568ff9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    MD5

    ad4a51647ca5a6fcb60d8481c7705aeb

    SHA1

    74505a140b8d799bd79165b2c98d1fccd17905e2

    SHA256

    dd02cfeea1d24bdfcce43b53c221ad69db752182f1d6d33887454778f43f2196

    SHA512

    ae8a58d52ac2b32303f57cd545483970107046f0b297e4c6655323ef3fb94b4495571decdd091b33d303c813403e857b71e50e11d1035cbd9b4ca68704f5b3c1

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\GH6GOSZD.cookie
    MD5

    a6b9e2a539636f58f3ee53a573c0af35

    SHA1

    d3750edd0b9dbd2a402ac47fd64efc444ed52cd3

    SHA256

    f17fc4f3a8cb04394d156da0a6986510f3e4dab6e84e5f4b00362d913d77055b

    SHA512

    a7daf71ef1c6b7cdc2e5c1501c1b26861ae4435dc2e4d03f1e58973af3770c1e0ff2bc4386027fd00ed2db1f8ea3a669bc8c3ab05e93911f8fb11feac4996f44

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\Z51J2YFK.cookie
    MD5

    580d5b43dbcd937527c4953166adf6c3

    SHA1

    1a35608171bb77417baadf8c5909fd58530e0ebd

    SHA256

    774c0a1e370ac91c673adcf102d36486d98947d889983097817fb8716ccc25a0

    SHA512

    744350018b0752593123503bbb6043d03636334e509cd8bfebbd14300bea7083355bd4636d32bea01608d95a1992aac3c634e320ff51f1192ba31b67e358ceec

  • memory/1684-145-0x00007FFF13780000-0x00007FFF137EB000-memory.dmp
    Filesize

    428KB

  • memory/1684-123-0x00007FFF13780000-0x00007FFF137EB000-memory.dmp
    Filesize

    428KB

  • memory/1684-122-0x00007FFF13780000-0x00007FFF137EB000-memory.dmp
    Filesize

    428KB

  • memory/1684-147-0x00007FFF13780000-0x00007FFF137EB000-memory.dmp
    Filesize

    428KB

  • memory/1684-124-0x00007FFF13780000-0x00007FFF137EB000-memory.dmp
    Filesize

    428KB

  • memory/1684-125-0x00007FFF13780000-0x00007FFF137EB000-memory.dmp
    Filesize

    428KB

  • memory/1684-127-0x00007FFF13780000-0x00007FFF137EB000-memory.dmp
    Filesize

    428KB

  • memory/1684-128-0x00007FFF13780000-0x00007FFF137EB000-memory.dmp
    Filesize

    428KB

  • memory/1684-129-0x00007FFF13780000-0x00007FFF137EB000-memory.dmp
    Filesize

    428KB

  • memory/1684-131-0x00007FFF13780000-0x00007FFF137EB000-memory.dmp
    Filesize

    428KB

  • memory/1684-115-0x00007FFF13780000-0x00007FFF137EB000-memory.dmp
    Filesize

    428KB

  • memory/1684-133-0x00007FFF13780000-0x00007FFF137EB000-memory.dmp
    Filesize

    428KB

  • memory/1684-150-0x00007FFF13780000-0x00007FFF137EB000-memory.dmp
    Filesize

    428KB

  • memory/1684-136-0x00007FFF13780000-0x00007FFF137EB000-memory.dmp
    Filesize

    428KB

  • memory/1684-137-0x00007FFF13780000-0x00007FFF137EB000-memory.dmp
    Filesize

    428KB

  • memory/1684-138-0x00007FFF13780000-0x00007FFF137EB000-memory.dmp
    Filesize

    428KB

  • memory/1684-116-0x00007FFF13780000-0x00007FFF137EB000-memory.dmp
    Filesize

    428KB

  • memory/1684-142-0x00007FFF13780000-0x00007FFF137EB000-memory.dmp
    Filesize

    428KB

  • memory/1684-141-0x00007FFF13780000-0x00007FFF137EB000-memory.dmp
    Filesize

    428KB

  • memory/1684-144-0x00007FFF13780000-0x00007FFF137EB000-memory.dmp
    Filesize

    428KB

  • memory/1684-132-0x00007FFF13780000-0x00007FFF137EB000-memory.dmp
    Filesize

    428KB

  • memory/1684-121-0x00007FFF13780000-0x00007FFF137EB000-memory.dmp
    Filesize

    428KB

  • memory/1684-135-0x00007FFF13780000-0x00007FFF137EB000-memory.dmp
    Filesize

    428KB

  • memory/1684-149-0x00007FFF13780000-0x00007FFF137EB000-memory.dmp
    Filesize

    428KB

  • memory/1684-151-0x00007FFF13780000-0x00007FFF137EB000-memory.dmp
    Filesize

    428KB

  • memory/1684-155-0x00007FFF13780000-0x00007FFF137EB000-memory.dmp
    Filesize

    428KB

  • memory/1684-156-0x00007FFF13780000-0x00007FFF137EB000-memory.dmp
    Filesize

    428KB

  • memory/1684-157-0x00007FFF13780000-0x00007FFF137EB000-memory.dmp
    Filesize

    428KB

  • memory/1684-163-0x00007FFF13780000-0x00007FFF137EB000-memory.dmp
    Filesize

    428KB

  • memory/1684-164-0x00007FFF13780000-0x00007FFF137EB000-memory.dmp
    Filesize

    428KB

  • memory/1684-165-0x00007FFF13780000-0x00007FFF137EB000-memory.dmp
    Filesize

    428KB

  • memory/1684-166-0x00007FFF13780000-0x00007FFF137EB000-memory.dmp
    Filesize

    428KB

  • memory/1684-167-0x00007FFF13780000-0x00007FFF137EB000-memory.dmp
    Filesize

    428KB

  • memory/1684-168-0x00007FFF13780000-0x00007FFF137EB000-memory.dmp
    Filesize

    428KB

  • memory/1684-169-0x00007FFF13780000-0x00007FFF137EB000-memory.dmp
    Filesize

    428KB

  • memory/1684-173-0x00007FFF13780000-0x00007FFF137EB000-memory.dmp
    Filesize

    428KB

  • memory/1684-174-0x00007FFF13780000-0x00007FFF137EB000-memory.dmp
    Filesize

    428KB

  • memory/1684-177-0x00007FFF13780000-0x00007FFF137EB000-memory.dmp
    Filesize

    428KB

  • memory/1684-178-0x00007FFF13780000-0x00007FFF137EB000-memory.dmp
    Filesize

    428KB

  • memory/1684-179-0x00007FFF13780000-0x00007FFF137EB000-memory.dmp
    Filesize

    428KB

  • memory/1684-120-0x00007FFF13780000-0x00007FFF137EB000-memory.dmp
    Filesize

    428KB

  • memory/1684-119-0x00007FFF13780000-0x00007FFF137EB000-memory.dmp
    Filesize

    428KB

  • memory/1684-117-0x00007FFF13780000-0x00007FFF137EB000-memory.dmp
    Filesize

    428KB

  • memory/3328-140-0x0000000000000000-mapping.dmp