Analysis

  • max time kernel
    75s
  • max time network
    73s
  • platform
    windows10_x64
  • resource
    win10-en-20210920
  • submitted
    27-10-2021 04:08

General

  • Target

    https://www.secretemailsystem.com/ROO/billg@microsoft.com

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://www.secretemailsystem.com/ROO/billg@microsoft.com
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2044
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2044 CREDAT:82945 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1060
  • C:\Windows\SysWOW64\DllHost.exe
    C:\Windows\SysWOW64\DllHost.exe /Processid:{7966B4D8-4FDC-4126-A10B-39A3209AD251}
    1⤵
      PID:756

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Modify Registry

    1
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\5080DC7A65DB6A5960ECD874088F3328_862BA1770B2FEE013603D2FF9ABEAFDA
      MD5

      33d255459d536a10b03dd57ccfb3e034

      SHA1

      b5344c08c192e7daec118ed934bd112f0eb6ad3b

      SHA256

      0d2ca79e3be4f1df05fd1a5cf5496d57f18b7c0dd64f38d06db102b7c70f5a0a

      SHA512

      42172e02e1075ef0bf228b5a54042d384b7a463091e034c61fca6f1c1b90b03832dd4f6a7351f71fa697bb3d29958a982e71923f4edd53b568151bdd2127daf6

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_1DC6D7385EA816C957BA2B715AC5C442
      MD5

      30b2bb294f7473106e693d9a9ee6e880

      SHA1

      c7ea87811616b11e1c5c97d87da7dbb1c5a65186

      SHA256

      1cdac5431ee7699e169e1b14cde4e769fbc9ae2def544d0e091a4eafa53bead8

      SHA512

      1c3f0615abf078db556cb5002021574b65c231b5c9109606c7927d527a7055db898d7e89e0e4e6d544977cf2a52eb6bc7dd5ec7433722f6f32060ee0bc45764a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_711ED44619924BA6DC33E69F97E7FF63
      MD5

      781a0d501315ae8724c629a3000f21b4

      SHA1

      eb44d144eae39823ae5fea00bf2626138ea7a6c3

      SHA256

      4a6c5b1d790103ea63abd2f1566cd7ca8c5ea3ba7e1dcf75b81d91d8e5f14f43

      SHA512

      792d58da4a3ea8e7bb795a019b8576899ced5b2eee247840ddd2fcfbed0643bbb2fd99c50271761a057c5a24369d5ecc0c7335f7f9fc36e1ab62517d73e165a5

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_2DBE917624E9880FE0C7C5570D56E691
      MD5

      5f92b931a73ab8d2e3afb6dcda0f37fe

      SHA1

      6c3ade9aa4399c72b6c47c43cc91cc394d5e86c6

      SHA256

      6c0235fe339729c7de14ec87ad9af14c430ff32bc5382404803e8f0b4240617b

      SHA512

      c47b224a8d5ff45676f42558b142b18dc11ca7a410ec3f5b28dd75be254c15909d8e6a7a47c9ea239ee7a92071198d0fad681e7e7e462674fc1e52dd4afc7925

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\5080DC7A65DB6A5960ECD874088F3328_862BA1770B2FEE013603D2FF9ABEAFDA
      MD5

      d3f7016018ea9ae02b9b413fd13ec32b

      SHA1

      bbcb35d5adf93d4df76920f6aa18f52cd8371b6f

      SHA256

      ea40f70727b972fac08ede855c3f21e55f190393ca194d129358aaa2ae540934

      SHA512

      b046cc35ede1b7e6f6b460b9808535a51bc7dc31d7bc4e161f800dc86474d882150d984fcf8dc0b00bb0ce2f02f343358cd91cb10dce860ade5d1c5939012a86

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_1DC6D7385EA816C957BA2B715AC5C442
      MD5

      cc15f2f08e412df4a23a741baab866f2

      SHA1

      b32852c9507c3d1b4a5f3f665fb035b1674a8477

      SHA256

      41d5a93f58be5bf3604f201d2720b3338ad43a4afd010525d35059d6baca9cbb

      SHA512

      88980dee86c55579517e8a37bacc39c5385dc50ba9b6a915ebec42d9f8845c40bcee24505afda48dbc2165dfbe4bd5649b9199f6d0d4f2c5c647e5909dadbd05

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_711ED44619924BA6DC33E69F97E7FF63
      MD5

      37aec8d91bb09bdde71f20f63e61dfca

      SHA1

      1431cde452d70ffed6cceac84c9e8261cfec3fbe

      SHA256

      869671db63421b4030febb108b277d542cf1bba72d860ef6215bba1128e69df5

      SHA512

      dd5d0f5c337a9e2b57234d5469c74b9a73adc16099fa5f5441fb04384a68157921e3eebeeb2506b6afeb9e430e1936cb23a5f72c53c6222cbac4dc4d2650fbea

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_2DBE917624E9880FE0C7C5570D56E691
      MD5

      46fb6de6202626a786603043906ff849

      SHA1

      037870dfab41d3980221ec00fa846a4ccc6c624c

      SHA256

      22a87ef2c2c24cfa936f54243fe6ed0ceffc9a98996d9cdc58ea5a8f98a08d0c

      SHA512

      598d2b2c87c183b4e7715c1a1dbf6dfd5e80e106b1ded4ad9559af95c046b55dec618431b6ea2fc736c83691246bd1a24242dde5f1b7cf0f5f4a1f0cb0499b17

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\5ESNRN8D.cookie
      MD5

      a37ebbe3a43a82e6f3ef120c3e0f7e11

      SHA1

      c206d38fc5837275ab66a98275a199e5cd14c7a9

      SHA256

      b3406c402f52492457aa93607e4123bf89f5177fafba0bc9d8f062c4b7d10366

      SHA512

      247dd501d1973ce4c6bce1c38cdb6f55eaab139d46fede7197ca2e68df7ef4f77bc6d6b947895e1a4ce5206fd4467d4597dbafb127ea963c27a4035902fdb74d

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\73WPIKQH.cookie
      MD5

      9ef6a7c8422933b3706063364c13f4e1

      SHA1

      e05de6ffdfd201f665b1d8d4338db2415d1891e2

      SHA256

      175c34b4387fb021c288928197a0210f4927a33d95f992fb1f334aba9367e056

      SHA512

      6ed7f906d60e67157ea1411be11be3e630b54ff36a4ce02254ebc9697a1615edba5dab5527c598bb6e1c899793a4c3e7304df9582be81892609c07f30d698195

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\N4CR8T79.cookie
      MD5

      82929a07235ffe70d3baf44751201d8e

      SHA1

      fd428972d094b2e8cb15d9b2b833208aec77a6a6

      SHA256

      b693f9d853cb44ccd0ee079e56a1802a336725de1e8921706f38754bf40010bd

      SHA512

      81957a757f5df9ff14d98cd5519262f3494fc875ef17291d667d49614a2c0bf8cf341b01c6402d6e51171f1732daa031d23fc63c647d0e471724f3d42a6d4d8b

    • memory/1060-140-0x0000000000000000-mapping.dmp
    • memory/2044-142-0x00007FF956700000-0x00007FF95676B000-memory.dmp
      Filesize

      428KB

    • memory/2044-155-0x00007FF956700000-0x00007FF95676B000-memory.dmp
      Filesize

      428KB

    • memory/2044-125-0x00007FF956700000-0x00007FF95676B000-memory.dmp
      Filesize

      428KB

    • memory/2044-127-0x00007FF956700000-0x00007FF95676B000-memory.dmp
      Filesize

      428KB

    • memory/2044-128-0x00007FF956700000-0x00007FF95676B000-memory.dmp
      Filesize

      428KB

    • memory/2044-129-0x00007FF956700000-0x00007FF95676B000-memory.dmp
      Filesize

      428KB

    • memory/2044-131-0x00007FF956700000-0x00007FF95676B000-memory.dmp
      Filesize

      428KB

    • memory/2044-132-0x00007FF956700000-0x00007FF95676B000-memory.dmp
      Filesize

      428KB

    • memory/2044-134-0x00007FF956700000-0x00007FF95676B000-memory.dmp
      Filesize

      428KB

    • memory/2044-135-0x00007FF956700000-0x00007FF95676B000-memory.dmp
      Filesize

      428KB

    • memory/2044-136-0x00007FF956700000-0x00007FF95676B000-memory.dmp
      Filesize

      428KB

    • memory/2044-137-0x00007FF956700000-0x00007FF95676B000-memory.dmp
      Filesize

      428KB

    • memory/2044-138-0x00007FF956700000-0x00007FF95676B000-memory.dmp
      Filesize

      428KB

    • memory/2044-141-0x00007FF956700000-0x00007FF95676B000-memory.dmp
      Filesize

      428KB

    • memory/2044-123-0x00007FF956700000-0x00007FF95676B000-memory.dmp
      Filesize

      428KB

    • memory/2044-144-0x00007FF956700000-0x00007FF95676B000-memory.dmp
      Filesize

      428KB

    • memory/2044-145-0x00007FF956700000-0x00007FF95676B000-memory.dmp
      Filesize

      428KB

    • memory/2044-147-0x00007FF956700000-0x00007FF95676B000-memory.dmp
      Filesize

      428KB

    • memory/2044-149-0x00007FF956700000-0x00007FF95676B000-memory.dmp
      Filesize

      428KB

    • memory/2044-150-0x00007FF956700000-0x00007FF95676B000-memory.dmp
      Filesize

      428KB

    • memory/2044-151-0x00007FF956700000-0x00007FF95676B000-memory.dmp
      Filesize

      428KB

    • memory/2044-124-0x00007FF956700000-0x00007FF95676B000-memory.dmp
      Filesize

      428KB

    • memory/2044-156-0x00007FF956700000-0x00007FF95676B000-memory.dmp
      Filesize

      428KB

    • memory/2044-157-0x00007FF956700000-0x00007FF95676B000-memory.dmp
      Filesize

      428KB

    • memory/2044-163-0x00007FF956700000-0x00007FF95676B000-memory.dmp
      Filesize

      428KB

    • memory/2044-164-0x00007FF956700000-0x00007FF95676B000-memory.dmp
      Filesize

      428KB

    • memory/2044-165-0x00007FF956700000-0x00007FF95676B000-memory.dmp
      Filesize

      428KB

    • memory/2044-166-0x00007FF956700000-0x00007FF95676B000-memory.dmp
      Filesize

      428KB

    • memory/2044-167-0x00007FF956700000-0x00007FF95676B000-memory.dmp
      Filesize

      428KB

    • memory/2044-168-0x00007FF956700000-0x00007FF95676B000-memory.dmp
      Filesize

      428KB

    • memory/2044-169-0x00007FF956700000-0x00007FF95676B000-memory.dmp
      Filesize

      428KB

    • memory/2044-122-0x00007FF956700000-0x00007FF95676B000-memory.dmp
      Filesize

      428KB

    • memory/2044-121-0x00007FF956700000-0x00007FF95676B000-memory.dmp
      Filesize

      428KB

    • memory/2044-120-0x00007FF956700000-0x00007FF95676B000-memory.dmp
      Filesize

      428KB

    • memory/2044-119-0x00007FF956700000-0x00007FF95676B000-memory.dmp
      Filesize

      428KB

    • memory/2044-117-0x00007FF956700000-0x00007FF95676B000-memory.dmp
      Filesize

      428KB

    • memory/2044-116-0x00007FF956700000-0x00007FF95676B000-memory.dmp
      Filesize

      428KB

    • memory/2044-115-0x00007FF956700000-0x00007FF95676B000-memory.dmp
      Filesize

      428KB

    • memory/2044-173-0x00007FF956700000-0x00007FF95676B000-memory.dmp
      Filesize

      428KB

    • memory/2044-175-0x00007FF956700000-0x00007FF95676B000-memory.dmp
      Filesize

      428KB

    • memory/2044-178-0x00007FF956700000-0x00007FF95676B000-memory.dmp
      Filesize

      428KB

    • memory/2044-179-0x00007FF956700000-0x00007FF95676B000-memory.dmp
      Filesize

      428KB