Analysis

  • max time kernel
    120s
  • max time network
    145s
  • submitted
    01-01-1970 00:00

General

  • Target

    https://form.jotform.com/212980299752063

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 49 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://form.jotform.com/212980299752063
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3280
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3280 CREDAT:82945 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1268

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
    MD5

    26f54bb46f9ca9bb4a7be2d01113cdf3

    SHA1

    21a3bed8c8dcd5bc82639f798f6c625b460dba19

    SHA256

    46b1c53bbb94fa53cbaec17b4ad9e60601895f03d18665fa60eb44328adb1369

    SHA512

    c6737170e8fb417cc54ce42a4773f3c54da419314bc0a569b09ea8bd8cbfc8285703eb44b0b22acc7f6c1f1443e690cd059fd14dcb16dbdbc946ac8dade73250

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27
    MD5

    965b86d9cfd73745a0e7801b70cdc803

    SHA1

    bba4645ddb00a1971069b7213a884aa218157a98

    SHA256

    31b02cdc4b6c4a687f5ed077db58edaec48b1dd4424a81e89c155a3b7ecff8bd

    SHA512

    e7bdcc10bb05b2ca1dcb4f2fd40f29f8fb74485295c33f4aebb94ec98359122fc990b16449d7d6b3fcb7dbbb82afcb79a682cd12d7d0c799d4de4ceb42b6cc7f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    MD5

    bcea7323f326d962c59e3a9a7ebc811f

    SHA1

    e83dab922b3bf0de554384c693b667b4f88c71d0

    SHA256

    e9c35bcdf6bf765bf64bde4ae9a4170c8e97f6748d2b9eff585d5fdbf729ea0c

    SHA512

    961c52bef301d80f00fb43e825382862ad880195f6652d895aaa032d646651af568c8cb0c21f6af13cfd8becc8330f931dbbeed5373b374f16a860c79c26de78

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
    MD5

    faca18b060094191c97231f9a5332822

    SHA1

    f3cc588aa00c140de4b00b462a1af6e39bd3818f

    SHA256

    33cc65407c32a0a889ffad734469724c4c0c9f7b2294723f26ffeee8f1e5e75a

    SHA512

    90d20c43f2ce082a4e2e5a80917194e9cc692d0d41a092ef4226cb0275bd70015aa1019cab44b64ad9e7c59c138ec5a213e910430b91d82c5374996bb14aa344

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E5205EFCE5BE7F88C3DF1D7AFFAD62C4
    MD5

    f29390bcc850e2fb250d65e417072c02

    SHA1

    fb593580fa662e471a6720dfa327a092d63795aa

    SHA256

    8802ea8939328e936f4ec797b724f0cf7cf7f28771614c53094d59f18b3352a8

    SHA512

    fad292267bb1ff442b414d296804a3119b6b6bd433fb4bda0e7316103cc4d096755728e52d1f2a0738ee85c03dcd80d529bd2f7b1a7f53162b4a67f9919fb1a4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
    MD5

    ec73146bfd712b0957282feaa038173f

    SHA1

    40ce485c3717e11d84a75bb7c1718178f8937865

    SHA256

    e6c71c58ca0e5155be2620129ac469baff5a66f93416179476af204b71322a08

    SHA512

    bb1f42b5d184bfa1f0ed90a451d09ca1bc6e3c3f43f840b1adbe2923a6f226081c6800972aed1f61f2f102156794edc5e6c8c656f6afe7411ca18ab5db6e0665

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27
    MD5

    a880a61728d315753e8e05d39b0bbbf3

    SHA1

    7648322490127f913489f7c3bc200a4fd10051fc

    SHA256

    8027cfdc17625d587bb65919c57fca2337f8a0492258d1f8fb85bb4702eeddbb

    SHA512

    bdfbd6fb20ee42ed8334959bbd4dfa259840759ce9599fc7afbfb6c95a399da7f2ac07361e44520fb57b0f8522bacb30bc492ad31111a52fb8ce86d811395398

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    MD5

    1e0bdf9e66ab1d9a56d59c1c75e640fd

    SHA1

    f2dec9e00997d55efef4ab732c66e073e62dc1d7

    SHA256

    f6e8c487747b88403b9f274cb4596f814cee598cb7afb42d96ad274e68d8f20d

    SHA512

    c2f36155952358c274b984e647797afe12291a3d0c78171c00d21addedfa142d7617da52a0971f0194ffbd2df80d6693fbbc3ec3b9af5d8e96d8c13c56ad5256

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
    MD5

    def533b0bb1e716dbe7df086c9d23c13

    SHA1

    fafb472fa8cb39034b8c4ef9d3b4688dc382d085

    SHA256

    6e5e321044b033adaf9765a864d6074937eda78e59c734accb8d066565443dd0

    SHA512

    d8ebd22263644a47fc57b31248f33c085dde0efd860acb22cdfad79171b2c78a382714fd9a3978cb2d38e69f8846b1e7c8cda6c374c697c4838d4670f28c6d70

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E5205EFCE5BE7F88C3DF1D7AFFAD62C4
    MD5

    e9b0ce0bffbcfca366d39aac73c0336c

    SHA1

    572f984e224e6e340eb7a6a3bbe2dfb0b2028154

    SHA256

    b6f12dc3a0b5d3c85185de03ff6f3eb2993374a6b44a6035b292d3837dd7b921

    SHA512

    7c947de6172a842d72e8d889d415cea462ad56eebe1ca8d8edb8719a9725b9481560b098ce271c362eacf96003a0eadd5a4b6f9439ceb632729c21e9448497e7

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\5G035CRM.cookie
    MD5

    77405d9b1e25b1a3fea83e3764c9aa48

    SHA1

    154da27c964714136b9d8f3ef57a7f0d3d603f83

    SHA256

    7af85859805c921690c85d74725f850dd03e89334126749e10871c18ce7333d9

    SHA512

    9105b561b50ff246914037e8b7451093d8a9e3aa1b8189075a98087a388beefe4142048d4b0449660de5207580b76d70c2aede98a75a0bf73b6b01252dc1fa5c

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\KS5W4LOC.cookie
    MD5

    4fed77994374175050a33719d6785dbe

    SHA1

    778978e0ef25bdf26ac5145638924fdad57080c2

    SHA256

    cae66a5595964be2127f333f5dbe788d5d12342b4356dd348a5d9b97c4c72358

    SHA512

    1fa4d5f71ddb839c6b3522ea5147a635e9e5a2c2f59e2fe96bb4e67c302aa0d54c6b3ca0902b09dbae8556c92a5b53ab3ce1e5b979430d47d49a7e4730a2e1fd

  • memory/1268-140-0x0000000000000000-mapping.dmp
  • memory/3280-134-0x00007FFF06FF0000-0x00007FFF0705B000-memory.dmp
    Filesize

    428KB

  • memory/3280-162-0x00007FFF06FF0000-0x00007FFF0705B000-memory.dmp
    Filesize

    428KB

  • memory/3280-115-0x00007FFF06FF0000-0x00007FFF0705B000-memory.dmp
    Filesize

    428KB

  • memory/3280-136-0x00007FFF06FF0000-0x00007FFF0705B000-memory.dmp
    Filesize

    428KB

  • memory/3280-135-0x00007FFF06FF0000-0x00007FFF0705B000-memory.dmp
    Filesize

    428KB

  • memory/3280-137-0x00007FFF06FF0000-0x00007FFF0705B000-memory.dmp
    Filesize

    428KB

  • memory/3280-138-0x00007FFF06FF0000-0x00007FFF0705B000-memory.dmp
    Filesize

    428KB

  • memory/3280-131-0x00007FFF06FF0000-0x00007FFF0705B000-memory.dmp
    Filesize

    428KB

  • memory/3280-141-0x00007FFF06FF0000-0x00007FFF0705B000-memory.dmp
    Filesize

    428KB

  • memory/3280-142-0x00007FFF06FF0000-0x00007FFF0705B000-memory.dmp
    Filesize

    428KB

  • memory/3280-144-0x00007FFF06FF0000-0x00007FFF0705B000-memory.dmp
    Filesize

    428KB

  • memory/3280-145-0x00007FFF06FF0000-0x00007FFF0705B000-memory.dmp
    Filesize

    428KB

  • memory/3280-147-0x00007FFF06FF0000-0x00007FFF0705B000-memory.dmp
    Filesize

    428KB

  • memory/3280-149-0x00007FFF06FF0000-0x00007FFF0705B000-memory.dmp
    Filesize

    428KB

  • memory/3280-150-0x00007FFF06FF0000-0x00007FFF0705B000-memory.dmp
    Filesize

    428KB

  • memory/3280-151-0x00007FFF06FF0000-0x00007FFF0705B000-memory.dmp
    Filesize

    428KB

  • memory/3280-155-0x00007FFF06FF0000-0x00007FFF0705B000-memory.dmp
    Filesize

    428KB

  • memory/3280-156-0x00007FFF06FF0000-0x00007FFF0705B000-memory.dmp
    Filesize

    428KB

  • memory/3280-157-0x00007FFF06FF0000-0x00007FFF0705B000-memory.dmp
    Filesize

    428KB

  • memory/3280-158-0x00007FFF06FF0000-0x00007FFF0705B000-memory.dmp
    Filesize

    428KB

  • memory/3280-159-0x00007FFF06FF0000-0x00007FFF0705B000-memory.dmp
    Filesize

    428KB

  • memory/3280-160-0x00007FFF06FF0000-0x00007FFF0705B000-memory.dmp
    Filesize

    428KB

  • memory/3280-161-0x00007FFF06FF0000-0x00007FFF0705B000-memory.dmp
    Filesize

    428KB

  • memory/3280-132-0x00007FFF06FF0000-0x00007FFF0705B000-memory.dmp
    Filesize

    428KB

  • memory/3280-163-0x00007FFF06FF0000-0x00007FFF0705B000-memory.dmp
    Filesize

    428KB

  • memory/3280-164-0x00007FFF06FF0000-0x00007FFF0705B000-memory.dmp
    Filesize

    428KB

  • memory/3280-167-0x00007FFF06FF0000-0x00007FFF0705B000-memory.dmp
    Filesize

    428KB

  • memory/3280-168-0x00007FFF06FF0000-0x00007FFF0705B000-memory.dmp
    Filesize

    428KB

  • memory/3280-129-0x00007FFF06FF0000-0x00007FFF0705B000-memory.dmp
    Filesize

    428KB

  • memory/3280-128-0x00007FFF06FF0000-0x00007FFF0705B000-memory.dmp
    Filesize

    428KB

  • memory/3280-171-0x00007FFF06FF0000-0x00007FFF0705B000-memory.dmp
    Filesize

    428KB

  • memory/3280-127-0x00007FFF06FF0000-0x00007FFF0705B000-memory.dmp
    Filesize

    428KB

  • memory/3280-125-0x00007FFF06FF0000-0x00007FFF0705B000-memory.dmp
    Filesize

    428KB

  • memory/3280-124-0x00007FFF06FF0000-0x00007FFF0705B000-memory.dmp
    Filesize

    428KB

  • memory/3280-123-0x00007FFF06FF0000-0x00007FFF0705B000-memory.dmp
    Filesize

    428KB

  • memory/3280-122-0x00007FFF06FF0000-0x00007FFF0705B000-memory.dmp
    Filesize

    428KB

  • memory/3280-121-0x00007FFF06FF0000-0x00007FFF0705B000-memory.dmp
    Filesize

    428KB

  • memory/3280-178-0x00007FFF06FF0000-0x00007FFF0705B000-memory.dmp
    Filesize

    428KB

  • memory/3280-182-0x00007FFF06FF0000-0x00007FFF0705B000-memory.dmp
    Filesize

    428KB

  • memory/3280-184-0x00007FFF06FF0000-0x00007FFF0705B000-memory.dmp
    Filesize

    428KB

  • memory/3280-185-0x00007FFF06FF0000-0x00007FFF0705B000-memory.dmp
    Filesize

    428KB

  • memory/3280-120-0x00007FFF06FF0000-0x00007FFF0705B000-memory.dmp
    Filesize

    428KB

  • memory/3280-119-0x00007FFF06FF0000-0x00007FFF0705B000-memory.dmp
    Filesize

    428KB

  • memory/3280-188-0x00007FFF06FF0000-0x00007FFF0705B000-memory.dmp
    Filesize

    428KB

  • memory/3280-189-0x00007FFF06FF0000-0x00007FFF0705B000-memory.dmp
    Filesize

    428KB

  • memory/3280-117-0x00007FFF06FF0000-0x00007FFF0705B000-memory.dmp
    Filesize

    428KB

  • memory/3280-116-0x00007FFF06FF0000-0x00007FFF0705B000-memory.dmp
    Filesize

    428KB