Resubmissions

20-10-2021 01:50

211020-b9l9kageb6 6

20-10-2021 01:45

211020-b6eqbagea9 10

Analysis

  • max time kernel
    133s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-en-20211014
  • submitted
    20-10-2021 01:45

General

  • Target

    https://hilltop2exit.xyz/kjlfkvd82d

  • Sample

    211020-b6eqbagea9

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 42 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 18 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://hilltop2exit.xyz/kjlfkvd82d
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1680
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1680 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:760
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1680 CREDAT:340994 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1612
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1680 CREDAT:537609 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1708
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1680 CREDAT:472095 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1540
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1680 CREDAT:406581 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:836

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    MD5

    cf4f77524681ce77694672a8aca9617c

    SHA1

    777476f702284f7ebfa6d087cceb4d3e6575b091

    SHA256

    95c7e8ee38abdf9a78a287e5c670d1ed3ec9fed8970554c75290e3bb9e465882

    SHA512

    8fd37d1e0e104e232d207a72fda022cd47157e165c6dcddb8acc3221109274b00709c592aeb2fc1a7f5df0caf0091e228616cbb723144a08630083e636a3e0a4

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\KC94CCU5\787FE8N4.htm
    MD5

    d36e5590cc0627f1497ea0c31b4b4713

    SHA1

    92d24bc66d9ba431e06f542504c331ea4c13d437

    SHA256

    7c1d8e1b9705210631fff25f10154cb78eff18203614cbdd62dfa8019b0f761c

    SHA512

    6d9619d94fe5109c43a8ece9f9cd118925c075e99ad010c6f61cd4cfe216146861e4130d15312dd04cad86cf46c342627545671bb67dc26b7c81e28fcd170529

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PBXRT4TL\XMTQWSA1.htm
    MD5

    d6128e7179fd8e986a40d3708c47d260

    SHA1

    2d7505f5e5bbf437bfba81df3a89c780be5f41fb

    SHA256

    9e0291a1e9fd41798d8bd5973685be9128e8278636dcf5155c7f099256da4dfc

    SHA512

    e7f7b0dbf6a84c2a83e1c0a440f9642a992989f4a2096ae88d57b8d802cb5dd05ea090a912e1e1e25d2dd34f93dd6ab3a1e01c0441f07d8a947529655455a348

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\RHI8KPQK\STMHOKI3.htm
    MD5

    c3802c8a91033d620d06573d937ef335

    SHA1

    4e61b7736e8e65ddfbea346e298895b95e82628d

    SHA256

    a25f7351ea59adebdfd3866e97282f92d5bfccdf0bd2a5b54d0d04559c761ee7

    SHA512

    e63e1415ed12f3c4c2e59d9c7e63ce7e1142ecf6a4a8bd4bbb257f7be69beeef69e0f09129f93f42d4e70418206847e90eb17f0395f834e0e9084630d621e132

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\1BM02Q2B.txt
    MD5

    77c57c04238753a2a2e740ad5fdc07e1

    SHA1

    8d1354b5884af08879a2d62898f7a2aa27534b0b

    SHA256

    6a8213de3164414e8f0d75685036426222875b8e25fbc206e3be22c9bd7e4911

    SHA512

    2f3fe2e46ce08b7d49853f5e1d5f23adf16b531386d5fd4fa8df02217fca2a138382d056f4e1b4224375c0b7f0bc78835ad0f05cb2272b317851c2e4123c0c45

  • memory/760-55-0x0000000000000000-mapping.dmp
  • memory/836-61-0x0000000000000000-mapping.dmp
  • memory/1540-60-0x0000000000000000-mapping.dmp
  • memory/1612-56-0x0000000000000000-mapping.dmp
  • memory/1680-54-0x000007FEFBA61000-0x000007FEFBA63000-memory.dmp
    Filesize

    8KB

  • memory/1708-58-0x0000000000000000-mapping.dmp