Analysis

  • max time kernel
    143s
  • max time network
    147s
  • platform
    windows10_x64
  • resource
    win10-de-20211014
  • submitted
    25-10-2021 07:00

General

  • Target

    Order number 4192 (Account Invoice 168100001849).html

  • Size

    5KB

  • MD5

    ce95e62ba83415bc28b21711e98baa13

  • SHA1

    29f9bd33074e201af10119b52797f61dbf50347e

  • SHA256

    4c059d9876c3e0ab630bbf69f3fb3d55bad17819ffa59c1636b280218bc65acc

  • SHA512

    0b440b0963f738142bb20e96aac24ccf0606acb09b1f24bedfb1d37e94690163e90222424060f8837b5364521ce8622e07a9ca14eed87d047e61614a70d275e4

Malware Config

Signatures

  • Registers COM server for autorun 1 TTPs
  • Detected potential entity reuse from brand microsoft.
  • Modifies Internet Explorer settings 1 TTPs 62 IoCs
  • Modifies registry class 45 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 9 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" "C:\Users\Admin\AppData\Local\Temp\Order number 4192 (Account Invoice 168100001849).html"
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:640
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:640 CREDAT:82945 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:684
  • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.196.0921.0007\FileSyncConfig.exe
    "C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.196.0921.0007\FileSyncConfig.exe"
    1⤵
    • Modifies registry class
    PID:1628

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_1DC6D7385EA816C957BA2B715AC5C442
    MD5

    05adc7f9b5d2cccc9837b0bd33fa81a2

    SHA1

    aab9cd536f6ba14dd72facc4bf8738b5a23f2ec3

    SHA256

    7fc792dff5bd4f9383f2f5d7bcfd69453420cbd639d9df1587592e4bfc0acb5a

    SHA512

    5a3f695c3cd7834367e92f0ca291ec800eff19f6db673501c8f29d513a3c2e238444fb464fcdc9c5ae94fcceb7c5a97370140a54bb42e903316323a67610e26f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    MD5

    18ff860a4d87ce019e1e5395d2fd1362

    SHA1

    8ed6f68642cba1f3011290f1efe9d1a13f69012a

    SHA256

    313dbdcbff4a4b7b49e034f2362805ac2b009b50c7d2f26b36233c76eae81fb9

    SHA512

    b865a29b5e86fce6b2d0db5e78cfc57d02a429c3722b5f955abd3335e43186f61840265d9094929cdb2262c58638d5b22ca9f185b26b165ee875cf4a23a3ab69

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_1DC6D7385EA816C957BA2B715AC5C442
    MD5

    ca3361cd47ce4525397ca1c23f6ebbeb

    SHA1

    08e8fc80445199157d31848fae946a097d4b5d5d

    SHA256

    81fb46b6c7d425bef4c92b7980ba0bed0849c951aa48b4406ee6ad6512e509a6

    SHA512

    79b648a20d883e993709f7e688642f4a816ab1b7622e14bdd5009beb31e95619c346cb39c183fbb0878846df77723cf7dc19dec23e69e89bd45086e62c63c28c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    MD5

    a11f0c9b3559b7f1820da6e446f03a7f

    SHA1

    b6f9122d057f7a6a210252fcab3a6eb0ff5e5b72

    SHA256

    d0b96f4e15fb982b8832354ac6173ac432287e9dbccb59c9d4c1f3d6bbbd5e75

    SHA512

    6606c9e74fc7370d434cf6c6be9be5e55f8e378706b4a91cf41205fad3f3cf1d0f650ddc4eb2edd3f598630e9c1672b580cd8b8072fdfb3f5d117dc08789b5a0

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\B3ARSLMP.cookie
    MD5

    4410911f62ec4250dd830bd283060675

    SHA1

    752b86f4d7655e73d8398ebe8b12657d5d5786b1

    SHA256

    2c82cb330b5425685238e37ba93e342c794eaafe04dc5edac290958c3b29a7b9

    SHA512

    7ebbea57fb363ccb0df282c68d97146963cfab6c6ce5e69f93368d0000d493c8444b1ec6b5efe7a0ba56d30280cf1a78002556c6260f8b08bc89d6fc52537752

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\UZYPQFSJ.cookie
    MD5

    fab3f2d345b8a8a2c52cedd8c5008252

    SHA1

    54803c5aff9d6343ca9b47fa0e2b724bdde95159

    SHA256

    0c72e80ea002d4dab91b597dd759d635f57f93e14482b96721d140a53fb1b444

    SHA512

    c41d0b47609015ba86007e7e47bc447710204a39cebc5fca287b9f9e0de8749f19e48f3fa85d9b6a346860258713649c1f5b9e7ca7ddba8e31fc47c0a195be97

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\ZP769170.cookie
    MD5

    e172e154445b7e55db499ccbda0fabe1

    SHA1

    8f0573942a87460b5a445e9a7168d390c5f4420b

    SHA256

    2d1381260fd40daf9012dd6a407aecb5486162841727a210a54b99ec2cc72cab

    SHA512

    2dac951bf41f1936f67258c87aaca2e50e04a16b498b3ee6fafa9b06b2667bc50eb3eb2875c093a6e2a27edf83fafbbb4323f97e4c3816bc1017c2b3f168e228

  • memory/640-140-0x00007FFF64E20000-0x00007FFF64E8B000-memory.dmp
    Filesize

    428KB

  • memory/640-148-0x00007FFF64E20000-0x00007FFF64E8B000-memory.dmp
    Filesize

    428KB

  • memory/640-121-0x00007FFF64E20000-0x00007FFF64E8B000-memory.dmp
    Filesize

    428KB

  • memory/640-122-0x00007FFF64E20000-0x00007FFF64E8B000-memory.dmp
    Filesize

    428KB

  • memory/640-123-0x00007FFF64E20000-0x00007FFF64E8B000-memory.dmp
    Filesize

    428KB

  • memory/640-124-0x00007FFF64E20000-0x00007FFF64E8B000-memory.dmp
    Filesize

    428KB

  • memory/640-125-0x00007FFF64E20000-0x00007FFF64E8B000-memory.dmp
    Filesize

    428KB

  • memory/640-127-0x00007FFF64E20000-0x00007FFF64E8B000-memory.dmp
    Filesize

    428KB

  • memory/640-128-0x00007FFF64E20000-0x00007FFF64E8B000-memory.dmp
    Filesize

    428KB

  • memory/640-129-0x00007FFF64E20000-0x00007FFF64E8B000-memory.dmp
    Filesize

    428KB

  • memory/640-131-0x00007FFF64E20000-0x00007FFF64E8B000-memory.dmp
    Filesize

    428KB

  • memory/640-132-0x00007FFF64E20000-0x00007FFF64E8B000-memory.dmp
    Filesize

    428KB

  • memory/640-133-0x00007FFF64E20000-0x00007FFF64E8B000-memory.dmp
    Filesize

    428KB

  • memory/640-135-0x00007FFF64E20000-0x00007FFF64E8B000-memory.dmp
    Filesize

    428KB

  • memory/640-136-0x00007FFF64E20000-0x00007FFF64E8B000-memory.dmp
    Filesize

    428KB

  • memory/640-137-0x00007FFF64E20000-0x00007FFF64E8B000-memory.dmp
    Filesize

    428KB

  • memory/640-138-0x00007FFF64E20000-0x00007FFF64E8B000-memory.dmp
    Filesize

    428KB

  • memory/640-119-0x00007FFF64E20000-0x00007FFF64E8B000-memory.dmp
    Filesize

    428KB

  • memory/640-143-0x00007FFF64E20000-0x00007FFF64E8B000-memory.dmp
    Filesize

    428KB

  • memory/640-145-0x00007FFF64E20000-0x00007FFF64E8B000-memory.dmp
    Filesize

    428KB

  • memory/640-146-0x00007FFF64E20000-0x00007FFF64E8B000-memory.dmp
    Filesize

    428KB

  • memory/640-120-0x00007FFF64E20000-0x00007FFF64E8B000-memory.dmp
    Filesize

    428KB

  • memory/640-150-0x00007FFF64E20000-0x00007FFF64E8B000-memory.dmp
    Filesize

    428KB

  • memory/640-151-0x00007FFF64E20000-0x00007FFF64E8B000-memory.dmp
    Filesize

    428KB

  • memory/640-152-0x00007FFF64E20000-0x00007FFF64E8B000-memory.dmp
    Filesize

    428KB

  • memory/640-156-0x00007FFF64E20000-0x00007FFF64E8B000-memory.dmp
    Filesize

    428KB

  • memory/640-157-0x00007FFF64E20000-0x00007FFF64E8B000-memory.dmp
    Filesize

    428KB

  • memory/640-158-0x00007FFF64E20000-0x00007FFF64E8B000-memory.dmp
    Filesize

    428KB

  • memory/640-164-0x00007FFF64E20000-0x00007FFF64E8B000-memory.dmp
    Filesize

    428KB

  • memory/640-165-0x00007FFF64E20000-0x00007FFF64E8B000-memory.dmp
    Filesize

    428KB

  • memory/640-166-0x00007FFF64E20000-0x00007FFF64E8B000-memory.dmp
    Filesize

    428KB

  • memory/640-167-0x00007FFF64E20000-0x00007FFF64E8B000-memory.dmp
    Filesize

    428KB

  • memory/640-168-0x00007FFF64E20000-0x00007FFF64E8B000-memory.dmp
    Filesize

    428KB

  • memory/640-169-0x00007FFF64E20000-0x00007FFF64E8B000-memory.dmp
    Filesize

    428KB

  • memory/640-173-0x00007FFF64E20000-0x00007FFF64E8B000-memory.dmp
    Filesize

    428KB

  • memory/640-117-0x00007FFF64E20000-0x00007FFF64E8B000-memory.dmp
    Filesize

    428KB

  • memory/640-116-0x00007FFF64E20000-0x00007FFF64E8B000-memory.dmp
    Filesize

    428KB

  • memory/640-115-0x00007FFF64E20000-0x00007FFF64E8B000-memory.dmp
    Filesize

    428KB

  • memory/640-174-0x00007FFF64E20000-0x00007FFF64E8B000-memory.dmp
    Filesize

    428KB

  • memory/640-177-0x00007FFF64E20000-0x00007FFF64E8B000-memory.dmp
    Filesize

    428KB

  • memory/640-178-0x00007FFF64E20000-0x00007FFF64E8B000-memory.dmp
    Filesize

    428KB

  • memory/640-179-0x00007FFF64E20000-0x00007FFF64E8B000-memory.dmp
    Filesize

    428KB

  • memory/684-141-0x0000000000000000-mapping.dmp