Analysis

  • max time kernel
    139s
  • max time network
    237s
  • platform
    windows10_x64
  • resource
    win10-en-20210920
  • submitted
    21-10-2021 17:53

General

  • Target

    https://mssmc.edu.np/Microsoft/FBG/

  • Sample

    211021-wgdryaaeg8

Score
5/10

Malware Config

Signatures

  • Detected potential entity reuse from brand microsoft.
  • Modifies Internet Explorer settings 1 TTPs 45 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://mssmc.edu.np/Microsoft/FBG/
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:420
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:420 CREDAT:82945 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:4344

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751
    MD5

    54e9306f95f32e50ccd58af19753d929

    SHA1

    eab9457321f34d4dcf7d4a0ac83edc9131bf7c57

    SHA256

    45f94dceb18a8f738a26da09ce4558995a4fe02b971882e8116fc9b59813bb72

    SHA512

    8711a4d866f21cdf4d4e6131ec4cfaf6821d0d22b90946be8b5a09ab868af0270a89bc326f03b858f0361a83c11a1531b894dfd1945e4812ba429a7558791f4f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_AD319D6DA1A11BC83AC8B4E4D3638231
    MD5

    e8ae544d0354ad6026f0d5e9b00b8b26

    SHA1

    c9ef4adfdd9e9e23daa9abeadb87388443741902

    SHA256

    90f2f91975c5bcdf10a4df7cefc904e1efe20fa960274e4780c884b5f3628315

    SHA512

    342fc387a03bf3da7a9efd541f29a2906e1f267159e64bb2ff98801516192a858775bfd0083b564e1acdb68c45dc0663dda4d2dff027e43149ee23b699d2fa26

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    MD5

    960badc027f372ad21ed00e41ab77db8

    SHA1

    19ce7920225b093cc1c3ac07e5b5367fd171d43c

    SHA256

    c20983f7b876c8f644a6830750803674471e0be7f787ee61c743256561d14323

    SHA512

    e5b46a5abfc795be457524fdd7bacfec9a4c6dbc931bbeb4ba0e7068a957a6bbbb268a5bdd07668201f6500d51d1a87cee39c06f0ba0885483822850676468a5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\DB25BCF26EE9188B9C2CA69495FAC45F
    MD5

    43c9b73c98791fc4aba223580fd6a235

    SHA1

    399e5d6bdd0989ddd5f82d26c7f700773203ad49

    SHA256

    606900e6b89a5ee6d051f00c71683a7b13409e3bf1d6b71dcfd923a92ed76893

    SHA512

    8dc52b1962ab12bbe78a449f456141f1fffd0ba21bbaae32a216d9ee47b43dcf83b195dd1ea28d24c5d998c195b527cb9eb42224db0431a43ad6fea340b9bf07

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751
    MD5

    9580f6f173138c2d7c9d272331b20315

    SHA1

    ea70299aff08473a5f2170a190a5b10b77acf369

    SHA256

    61a2b35cc280654e9312f4719d81ebf649aeb91149bddea719c05572400e51e4

    SHA512

    f9ccd34779c29d6d9b7a32824447f289b1cfa5b8e180540f93bd274e8087c86631824b91df45f112dcbee218a081d8a6be812860ff95a1d28d2d516902ebf4a0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_AD319D6DA1A11BC83AC8B4E4D3638231
    MD5

    d685af85bc887cdbd229d052ebe01a5f

    SHA1

    7440e5d65142ae950c9c7b3a3be207bf17bebc76

    SHA256

    7fe47768092abfa4109d8daff0ce26be7c3694fbc8725772790d63132c1c13ae

    SHA512

    06579cc8d7579cf78883c534af385f169a71b7f22f1e6dc3ef8733659b0857f68945d4feb0dab4e9e8ab9fa248c6d9a7a85f131a0086577c9341d8f3280f47bd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    MD5

    9bd3d1b7d3e8f2fd29f2fb587a4b7d26

    SHA1

    381a4308e9b1c5252b2e3d7497a76c7ce35563fa

    SHA256

    c9104517f12b5175db65c49de4725215000719b98862f0b14b721037c8d25c62

    SHA512

    dbcff2824c577bcfb7764c216d97560114f09aa6284da0fc7d044ef991d612e87a0236c4e6e0cb88db077c7cba8db4dc8f7126241b9449cbbc2e49bbcab657d9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\DB25BCF26EE9188B9C2CA69495FAC45F
    MD5

    0f3ef5764c5b7d46a75dbd5f342f91d1

    SHA1

    09ec13cf7c93ddacf2f50e8cda8cbab5482b783d

    SHA256

    17297f705abb80e72f6cc57d1030480be2167faabcd9d4687c5b563945e566c9

    SHA512

    b20aa25526c6ec9788d5c0a6d1e6baacddf407e79b5b1254fe2619e12797750bb5c831cf2e27862a857fdb8a8fb925077ee91fed775742bdf552c98e8fedc56c

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\56UJ4ORZ.cookie
    MD5

    e04853f7f6f9fc548ed780554b5c665e

    SHA1

    e67a0b6b2300be1fb2d134ac252088039bf60e23

    SHA256

    f990c61e548fbf3ea168318dae9120296af0205e5cad0c9067ea4921929c02bc

    SHA512

    5c7b8da0a446ae0ee7a8cd352999d4c933775612e268a88b0d7276665ab122f96365d8e36be40a6856ef14800ce93c23824cb00a67eb669d54d3383bdd58270c

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\ZPHL1WKQ.cookie
    MD5

    b52fd8f7b919652896d7bcee67ddcd5b

    SHA1

    2360beaa7f6a2e33626e9e94d6811c9d4eeada43

    SHA256

    dd5f6106bfd680c81e7f3fce3aef9dcb3c33390b4083945fc4cf1fd77ac46daa

    SHA512

    2f33ae067f3485e9468ac80e675f30ec9028c7d49a1227137aab4b4fc883f6a3ec9f0b26d0e2c4e2a95e8d89d5a4f4c1611a5f462d74821fcd1215cfb2448cd3

  • memory/420-144-0x00007FFC4E4B0000-0x00007FFC4E51B000-memory.dmp
    Filesize

    428KB

  • memory/420-151-0x00007FFC4E4B0000-0x00007FFC4E51B000-memory.dmp
    Filesize

    428KB

  • memory/420-124-0x00007FFC4E4B0000-0x00007FFC4E51B000-memory.dmp
    Filesize

    428KB

  • memory/420-125-0x00007FFC4E4B0000-0x00007FFC4E51B000-memory.dmp
    Filesize

    428KB

  • memory/420-127-0x00007FFC4E4B0000-0x00007FFC4E51B000-memory.dmp
    Filesize

    428KB

  • memory/420-128-0x00007FFC4E4B0000-0x00007FFC4E51B000-memory.dmp
    Filesize

    428KB

  • memory/420-129-0x00007FFC4E4B0000-0x00007FFC4E51B000-memory.dmp
    Filesize

    428KB

  • memory/420-132-0x00007FFC4E4B0000-0x00007FFC4E51B000-memory.dmp
    Filesize

    428KB

  • memory/420-131-0x00007FFC4E4B0000-0x00007FFC4E51B000-memory.dmp
    Filesize

    428KB

  • memory/420-133-0x00007FFC4E4B0000-0x00007FFC4E51B000-memory.dmp
    Filesize

    428KB

  • memory/420-135-0x00007FFC4E4B0000-0x00007FFC4E51B000-memory.dmp
    Filesize

    428KB

  • memory/420-136-0x00007FFC4E4B0000-0x00007FFC4E51B000-memory.dmp
    Filesize

    428KB

  • memory/420-137-0x00007FFC4E4B0000-0x00007FFC4E51B000-memory.dmp
    Filesize

    428KB

  • memory/420-138-0x00007FFC4E4B0000-0x00007FFC4E51B000-memory.dmp
    Filesize

    428KB

  • memory/420-141-0x00007FFC4E4B0000-0x00007FFC4E51B000-memory.dmp
    Filesize

    428KB

  • memory/420-142-0x00007FFC4E4B0000-0x00007FFC4E51B000-memory.dmp
    Filesize

    428KB

  • memory/420-121-0x00007FFC4E4B0000-0x00007FFC4E51B000-memory.dmp
    Filesize

    428KB

  • memory/420-145-0x00007FFC4E4B0000-0x00007FFC4E51B000-memory.dmp
    Filesize

    428KB

  • memory/420-147-0x00007FFC4E4B0000-0x00007FFC4E51B000-memory.dmp
    Filesize

    428KB

  • memory/420-149-0x00007FFC4E4B0000-0x00007FFC4E51B000-memory.dmp
    Filesize

    428KB

  • memory/420-150-0x00007FFC4E4B0000-0x00007FFC4E51B000-memory.dmp
    Filesize

    428KB

  • memory/420-123-0x00007FFC4E4B0000-0x00007FFC4E51B000-memory.dmp
    Filesize

    428KB

  • memory/420-155-0x00007FFC4E4B0000-0x00007FFC4E51B000-memory.dmp
    Filesize

    428KB

  • memory/420-156-0x00007FFC4E4B0000-0x00007FFC4E51B000-memory.dmp
    Filesize

    428KB

  • memory/420-157-0x00007FFC4E4B0000-0x00007FFC4E51B000-memory.dmp
    Filesize

    428KB

  • memory/420-163-0x00007FFC4E4B0000-0x00007FFC4E51B000-memory.dmp
    Filesize

    428KB

  • memory/420-164-0x00007FFC4E4B0000-0x00007FFC4E51B000-memory.dmp
    Filesize

    428KB

  • memory/420-165-0x00007FFC4E4B0000-0x00007FFC4E51B000-memory.dmp
    Filesize

    428KB

  • memory/420-166-0x00007FFC4E4B0000-0x00007FFC4E51B000-memory.dmp
    Filesize

    428KB

  • memory/420-167-0x00007FFC4E4B0000-0x00007FFC4E51B000-memory.dmp
    Filesize

    428KB

  • memory/420-168-0x00007FFC4E4B0000-0x00007FFC4E51B000-memory.dmp
    Filesize

    428KB

  • memory/420-169-0x00007FFC4E4B0000-0x00007FFC4E51B000-memory.dmp
    Filesize

    428KB

  • memory/420-170-0x00007FFC4E4B0000-0x00007FFC4E51B000-memory.dmp
    Filesize

    428KB

  • memory/420-122-0x00007FFC4E4B0000-0x00007FFC4E51B000-memory.dmp
    Filesize

    428KB

  • memory/420-120-0x00007FFC4E4B0000-0x00007FFC4E51B000-memory.dmp
    Filesize

    428KB

  • memory/420-119-0x00007FFC4E4B0000-0x00007FFC4E51B000-memory.dmp
    Filesize

    428KB

  • memory/420-117-0x00007FFC4E4B0000-0x00007FFC4E51B000-memory.dmp
    Filesize

    428KB

  • memory/420-116-0x00007FFC4E4B0000-0x00007FFC4E51B000-memory.dmp
    Filesize

    428KB

  • memory/420-115-0x00007FFC4E4B0000-0x00007FFC4E51B000-memory.dmp
    Filesize

    428KB

  • memory/420-171-0x00007FFC4E4B0000-0x00007FFC4E51B000-memory.dmp
    Filesize

    428KB

  • memory/420-175-0x00007FFC4E4B0000-0x00007FFC4E51B000-memory.dmp
    Filesize

    428KB

  • memory/420-176-0x00007FFC4E4B0000-0x00007FFC4E51B000-memory.dmp
    Filesize

    428KB

  • memory/420-179-0x00007FFC4E4B0000-0x00007FFC4E51B000-memory.dmp
    Filesize

    428KB

  • memory/4344-140-0x0000000000000000-mapping.dmp