Analysis

  • max time kernel
    126s
  • max time network
    128s
  • platform
    windows10_x64
  • resource
    win10-en-20210920
  • submitted
    25-10-2021 11:44

General

  • Target

    https://inbox.read2me.repl.co/vi-8pt-0dr-9abu-8phman-w8met-9a-8p-0dm

  • Sample

    211025-nv6qwaghhl

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 42 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://inbox.read2me.repl.co/vi-8pt-0dr-9abu-8phman-w8met-9a-8p-0dm
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3712
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3712 CREDAT:82945 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:920

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\5080DC7A65DB6A5960ECD874088F3328_862BA1770B2FEE013603D2FF9ABEAFDA
    MD5

    b9db26f59f20c6f2de18f281c72b0be8

    SHA1

    d3b1e3736293bded5169bf42e3954a8c5eaeabb3

    SHA256

    2c4aaaf6fa47850216764e544aaa045c84ac036fb24af5a5cf3d6c8d52024631

    SHA512

    0bc4295b3168a7f4a39d49c84410a5c762b1b4f2634096e835dab161273d5f3699f8483ed3ae7038032e1bc273898f294ddd3233d1ee4ab3ef6be40d63af24f8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_2DBE917624E9880FE0C7C5570D56E691
    MD5

    dd805174b8c130e5764ab5b639fec73f

    SHA1

    7ae59ee3b498149a6c30fcc72351acb32d0ebad8

    SHA256

    aade66e468127083084c9fb32bc41e57c89ffc77fc5362180d538d6881f597af

    SHA512

    6d99eb67184a8468df6e4ebcb98fc48ab0eefd98da9dc0957d69c9ce68be06fd88aac84137a51384816d967ca4a68b9c4d21835f62ae7c06629adb5259bc9832

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\5080DC7A65DB6A5960ECD874088F3328_862BA1770B2FEE013603D2FF9ABEAFDA
    MD5

    26abb15434e1afdbe71fe674f4b1a075

    SHA1

    71240f6015425f28a0c697c90fa51dd6ffbbcd2b

    SHA256

    029f038e4ed9b7ccc5a5ec10897d0c01de710579269f4241d91655ba6b9c887c

    SHA512

    b1089d618cb67469d6e5790fbc254ba1c0afa5ca43456fd38803e2ead1bb954b6f05893a2cc7ba2370ef9c5073ef162aef52d2a75178485971a6eb853231d935

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_2DBE917624E9880FE0C7C5570D56E691
    MD5

    a34386029d710da6b81840c33996d4aa

    SHA1

    04039151f38d50058382eee14f86da351af28917

    SHA256

    5961f9718b45b0f5f270b8da03ac83c6194b109bfe267952999318d5a11d4e7b

    SHA512

    5752e468c03a84829d7bb760c3df350aa12ffe414f5ca2f5a222ab1e2f71e709f8e9338969060a47441b65b55424da649e811197a85d49f7936b6fc706d54c78

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\33TKQF0T.cookie
    MD5

    3078876bf2e73157036188a5aaa3b2bb

    SHA1

    5a3f48bc77a7032ea0998120009eadd385608d00

    SHA256

    7f96fbf8fa213861c29f140920efcd9e73524d9d273ca9370716ba26c2ff7b85

    SHA512

    af49d6a53abc7d99d338ffbe5e782a1ccbc7df9d8adfecc767f04a8636d3d3f09c343da776e2439c40ae4c96b95f060291dc21347a17f979aa8368adb9e11101

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\IMC2HG31.cookie
    MD5

    75303993d3324533fab143a46092a658

    SHA1

    4ebd52db2d86b338918f65cd4f716cded76cf69a

    SHA256

    1875ad27bf99d505539f0e5068ccb43b08aa59847b22e665ecd2715e008b2752

    SHA512

    a6a40ea463d62aefef1bafbfc1cb2510dad66c0bd5d688598ed6f8b16c111b4af1ca05f295bfafb7827a6b1266df90ebb77e8c85d199908c2f05a188d314c0b2

  • memory/920-140-0x0000000000000000-mapping.dmp
  • memory/3712-138-0x00007FFD543A0000-0x00007FFD5440B000-memory.dmp
    Filesize

    428KB

  • memory/3712-145-0x00007FFD543A0000-0x00007FFD5440B000-memory.dmp
    Filesize

    428KB

  • memory/3712-120-0x00007FFD543A0000-0x00007FFD5440B000-memory.dmp
    Filesize

    428KB

  • memory/3712-121-0x00007FFD543A0000-0x00007FFD5440B000-memory.dmp
    Filesize

    428KB

  • memory/3712-122-0x00007FFD543A0000-0x00007FFD5440B000-memory.dmp
    Filesize

    428KB

  • memory/3712-123-0x00007FFD543A0000-0x00007FFD5440B000-memory.dmp
    Filesize

    428KB

  • memory/3712-124-0x00007FFD543A0000-0x00007FFD5440B000-memory.dmp
    Filesize

    428KB

  • memory/3712-125-0x00007FFD543A0000-0x00007FFD5440B000-memory.dmp
    Filesize

    428KB

  • memory/3712-127-0x00007FFD543A0000-0x00007FFD5440B000-memory.dmp
    Filesize

    428KB

  • memory/3712-128-0x00007FFD543A0000-0x00007FFD5440B000-memory.dmp
    Filesize

    428KB

  • memory/3712-129-0x00007FFD543A0000-0x00007FFD5440B000-memory.dmp
    Filesize

    428KB

  • memory/3712-131-0x00007FFD543A0000-0x00007FFD5440B000-memory.dmp
    Filesize

    428KB

  • memory/3712-133-0x00007FFD543A0000-0x00007FFD5440B000-memory.dmp
    Filesize

    428KB

  • memory/3712-135-0x00007FFD543A0000-0x00007FFD5440B000-memory.dmp
    Filesize

    428KB

  • memory/3712-134-0x00007FFD543A0000-0x00007FFD5440B000-memory.dmp
    Filesize

    428KB

  • memory/3712-136-0x00007FFD543A0000-0x00007FFD5440B000-memory.dmp
    Filesize

    428KB

  • memory/3712-137-0x00007FFD543A0000-0x00007FFD5440B000-memory.dmp
    Filesize

    428KB

  • memory/3712-117-0x00007FFD543A0000-0x00007FFD5440B000-memory.dmp
    Filesize

    428KB

  • memory/3712-141-0x00007FFD543A0000-0x00007FFD5440B000-memory.dmp
    Filesize

    428KB

  • memory/3712-142-0x00007FFD543A0000-0x00007FFD5440B000-memory.dmp
    Filesize

    428KB

  • memory/3712-144-0x00007FFD543A0000-0x00007FFD5440B000-memory.dmp
    Filesize

    428KB

  • memory/3712-119-0x00007FFD543A0000-0x00007FFD5440B000-memory.dmp
    Filesize

    428KB

  • memory/3712-147-0x00007FFD543A0000-0x00007FFD5440B000-memory.dmp
    Filesize

    428KB

  • memory/3712-149-0x00007FFD543A0000-0x00007FFD5440B000-memory.dmp
    Filesize

    428KB

  • memory/3712-150-0x00007FFD543A0000-0x00007FFD5440B000-memory.dmp
    Filesize

    428KB

  • memory/3712-151-0x00007FFD543A0000-0x00007FFD5440B000-memory.dmp
    Filesize

    428KB

  • memory/3712-155-0x00007FFD543A0000-0x00007FFD5440B000-memory.dmp
    Filesize

    428KB

  • memory/3712-156-0x00007FFD543A0000-0x00007FFD5440B000-memory.dmp
    Filesize

    428KB

  • memory/3712-157-0x00007FFD543A0000-0x00007FFD5440B000-memory.dmp
    Filesize

    428KB

  • memory/3712-163-0x00007FFD543A0000-0x00007FFD5440B000-memory.dmp
    Filesize

    428KB

  • memory/3712-164-0x00007FFD543A0000-0x00007FFD5440B000-memory.dmp
    Filesize

    428KB

  • memory/3712-165-0x00007FFD543A0000-0x00007FFD5440B000-memory.dmp
    Filesize

    428KB

  • memory/3712-166-0x00007FFD543A0000-0x00007FFD5440B000-memory.dmp
    Filesize

    428KB

  • memory/3712-167-0x00007FFD543A0000-0x00007FFD5440B000-memory.dmp
    Filesize

    428KB

  • memory/3712-168-0x00007FFD543A0000-0x00007FFD5440B000-memory.dmp
    Filesize

    428KB

  • memory/3712-169-0x00007FFD543A0000-0x00007FFD5440B000-memory.dmp
    Filesize

    428KB

  • memory/3712-170-0x00007FFD543A0000-0x00007FFD5440B000-memory.dmp
    Filesize

    428KB

  • memory/3712-116-0x00007FFD543A0000-0x00007FFD5440B000-memory.dmp
    Filesize

    428KB

  • memory/3712-115-0x00007FFD543A0000-0x00007FFD5440B000-memory.dmp
    Filesize

    428KB

  • memory/3712-174-0x00007FFD543A0000-0x00007FFD5440B000-memory.dmp
    Filesize

    428KB

  • memory/3712-175-0x00007FFD543A0000-0x00007FFD5440B000-memory.dmp
    Filesize

    428KB

  • memory/3712-178-0x00007FFD543A0000-0x00007FFD5440B000-memory.dmp
    Filesize

    428KB

  • memory/3712-179-0x00007FFD543A0000-0x00007FFD5440B000-memory.dmp
    Filesize

    428KB