Resubmissions

20-10-2021 01:50

211020-b9l9kageb6 6

20-10-2021 01:45

211020-b6eqbagea9 10

Analysis

  • max time kernel
    133s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-de-20210920
  • submitted
    20-10-2021 01:45

General

  • Target

    https://hilltop2exit.xyz/kjlfkvd82d

  • Sample

    211020-b6eqbagea9

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://hilltop2exit.xyz/kjlfkvd82d
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1724
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1724 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:308

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
    MD5

    ab5c36d10261c173c5896f3478cdc6b7

    SHA1

    87ac53810ad125663519e944bc87ded3979cbee4

    SHA256

    f8e90fb0557fe49d7702cfb506312ac0b24c97802f9c782696db6d47f434e8e9

    SHA512

    e83e4eae44e7a9cbcd267dbfc25a7f4f68b50591e3bbe267324b1f813c9220d565b284994ded5f7d2d371d50e1ebfa647176ec8de9716f754c6b5785c6e897fa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    MD5

    bad0216ccf7551eda2aa224c98adf376

    SHA1

    c6aa639ddd9c616faec8f3ca2f910f20e9d87bf4

    SHA256

    6b4a7b2b5ba61dac29634ea9e19389dda3246088f6cad7b95f8bb77c54bbc97f

    SHA512

    443b9abf22f13dcfb6c9703bb2d4a637413b3fa297aa294b5a2bbbfc22b33e35195d61c405ec4092183a4911cc15a2e5108209f01d74bcde0263592162955177

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\148YFYI7.txt
    MD5

    7020aedc9cc2dac3a115e28ba83bf271

    SHA1

    d20da4249af12b6257a366fdc6b88cdf3860e22f

    SHA256

    88b8e6ecb284d35a0f99f8f72f93eeaa00b4d58efdf23a0efce376f61cac96ef

    SHA512

    f8e65cf2f9ffcf6d4688cf54e142a328df56295a82ca39a5c1bf9e7bf07395c60f6cc9cd72ebfc273e03ee3854084c0324a4d2dd34aac6646d9b630df201f8d3

  • memory/308-54-0x0000000000000000-mapping.dmp