Analysis

  • max time kernel
    121s
  • max time network
    144s
  • platform
    windows10_x64
  • resource
    win10-en-20211014
  • submitted
    03-11-2021 08:33

General

  • Target

    https://jfrgzglmpvfo5rj31wzc4a-on.drv.tw/jutjyhtgdfy7u5644w56789olkujhgtfrd/fhji87t6rtedhjm/?c=aghaz@.fAHza.com.au

Score
10/10

Malware Config

Signatures

  • Detected google phishing page
  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://jfrgzglmpvfo5rj31wzc4a-on.drv.tw/jutjyhtgdfy7u5644w56789olkujhgtfrd/fhji87t6rtedhjm/?c=aghaz@.fAHza.com.au
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2704
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2704 CREDAT:82945 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1300

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751
    MD5

    54e9306f95f32e50ccd58af19753d929

    SHA1

    eab9457321f34d4dcf7d4a0ac83edc9131bf7c57

    SHA256

    45f94dceb18a8f738a26da09ce4558995a4fe02b971882e8116fc9b59813bb72

    SHA512

    8711a4d866f21cdf4d4e6131ec4cfaf6821d0d22b90946be8b5a09ab868af0270a89bc326f03b858f0361a83c11a1531b894dfd1945e4812ba429a7558791f4f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
    MD5

    6d707758dd2e7edf14d9621938e451ab

    SHA1

    e9c015074b63d4189ae2c4f212bb15e5a92dbf79

    SHA256

    945fc990738d49edfcc5e2be6c59ba6ce2fa1b483832f137d8ef897300f5f890

    SHA512

    1d486c4f781d495e4f903ae7789d40c81115d40d4efd593a88e3e831dd5a60a8117cee16cc80b05f7fd32fb937fcc94fb5936944c48c790e6bfa591e8a25bef2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\48ECEA7BF359ADF9D896AE1234BD8461
    MD5

    9fcf556eabd8635687915c5bd3d8b296

    SHA1

    58345419e37de8d02239856c9088a56ff5fb8d97

    SHA256

    247a011c071c618a56d338724be4c1c6ecfe6befb816ff9d7f452ebf2bc4a048

    SHA512

    0321ed144e697d04c8fe358f990a11e683198114312a5aa365b4082b661f214c9a9b666e9ab27269d1764b8826eefd89cce6179c21b64cb7a4ef0d11c9c571e5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    MD5

    f1a2125acbdb898001d89a7c410a2ddb

    SHA1

    c21bae5b9ab241f2d4b46f99f6c102f564766250

    SHA256

    af98e64ba55b91c8f28157583cb1c36c914309e06bd94bdf4eab2e085a2f522b

    SHA512

    0ddc8c97f98080d32b8c41d059c16a6060d01476afed216031908b1473db67edb55c9bbc7b4dab8265bb8226f408dafd8afb69c7d116101ce9d45143a714b41e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
    MD5

    64e9b8bb98e2303717538ce259bec57d

    SHA1

    2b07bf8e0d831da42760c54feff484635009c172

    SHA256

    76bd459ec8e467efc3e3fb94cb21b9c77a2aa73c9d4c0f3faf823677be756331

    SHA512

    8980af4a87a009f1ae165182d1edd4ccbd12b40a5890de5dbaea4dbf3aeb86edffd58b088b1e35e12d6b1197cc0db658a9392283583b3cb24a516ebc1f736c56

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F07644E38ED7C9F37D11EEC6D4335E02_97E8C71FB4682FA219538301ADBB2E90
    MD5

    52ae789ce6b3d1f5c0ba012aebf78991

    SHA1

    dcb9bfbb89ea5369fe14abb03f038102deaadad5

    SHA256

    88ea37f4fa7767d9cf64208ad10ae3c6b0365214e41e04b3f97c62d06599ef9c

    SHA512

    6799e69c9164c16d566163965f93907a465374ca4a9e13009537bc45aeb3b2824d1c42e31827764ad67e6e086d013535d803d1bf76037338231d0dc26f661cca

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751
    MD5

    2fdcfae3e0753c47bc91a634800c2447

    SHA1

    0a1f6b83b1cd5262f90d5376c76c700c64c5c589

    SHA256

    9ef37e461dd2ab8d0bd5dbee6d73f26674bc2f4d8b9f18a280f614c91045a7e2

    SHA512

    a3963c0aaa31ecc53e3df238eb11ff323f2a4d6e7021bbbf5894a38a0297ad2f8c34bbe8d84222ea3744563a4084e01109090158565019ff6c218be553421c9b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
    MD5

    c87ae6121ff33855c27737abb55b0feb

    SHA1

    5e369787cc6729a203b34808a013a59a58219a96

    SHA256

    23cad490267ebf23134b8525787d64cc13a49041b90e4b53a455e01459d1265a

    SHA512

    42d27db7891911e37b4732a74a38f272cbb098b54926f4185651123a02f492d49875d6161d2b0dd6eaeb67e22dda1afde1ee4d3cee27a023fe96b42a9bc1182a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\48ECEA7BF359ADF9D896AE1234BD8461
    MD5

    dd5699827bc2f85f313bc78ea933f4ec

    SHA1

    d2bbd35c883af6be1d104345e5f6c1b9975abd6e

    SHA256

    c106f36f57714f3e96e0cfbeaec85a79380d6865bf3cbdd84164c98f3c7c81a1

    SHA512

    7a79f5ccbe5d5213a100274bbbd4fdf343be71ab15f6ba4302d235e3c0c27223ac5cc6b3740aaf3505425c96fd96a8e4e8d6002cda629b23aa8062c6377c197c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    MD5

    5d507cc6dfa2228bc7f8fd8348db34ab

    SHA1

    c9b72f9e7f53106c63e840b9faa691f9f28c52f2

    SHA256

    bce85262c4937f0f48318604443f940db629af7396778824d7903b29fb98101c

    SHA512

    7c3e430c68d891c649be36c9c3aede939e01604db1e41238a04838131d5968618f42c283735ad43c9cbf917868df9d87b6fa89feeaf4de3ef96e90bb3a657d0a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
    MD5

    5506214aaac6f159da723675c8124c02

    SHA1

    d519ac32fdf573097633c2d3f54933ddb9890b97

    SHA256

    cbb30289f7b94c136faa4c66a3d9d67eda90ed26d54fa751a9d5837d2c3406fd

    SHA512

    bc2a5530c864c5cb08fc1a0901744856b64cc08f9e2cecdbf98b7ddfc0d809596368de89a632bb7071a1e2bcda0e07a8fb804ee0b654a5ced510ca6f62b94f81

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F07644E38ED7C9F37D11EEC6D4335E02_97E8C71FB4682FA219538301ADBB2E90
    MD5

    71bbfa4743b9530718816583917b46b2

    SHA1

    eb768a23e3b07d72d27f5abd7ab0c9fccce5e5a2

    SHA256

    32839da33bd6b389888692f962e9a3624212cc67fd3e54a904b257e514a970ed

    SHA512

    3c1d300ecef557f30499ffc66fd05e05cfd5221ce17b17e204eff5bcf1f3841c4e928bc146a7a3ef2e4a5ea253be350a9b0e04568987254fc427e3e410322931

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\616TAXS5.cookie
    MD5

    ed96d3266c6a0507e2e6323a18f42388

    SHA1

    75ca33e275bda7594951f020181e2d9b8325e2b0

    SHA256

    8d90ccb5c06a438dea291fb2240b25041bab3e68bcf7a5e36f59648ec79ed75b

    SHA512

    554af7c8d8f7af92ca1635c8e1e807e2624a0b345d7938a0334b79510e54de4de878640ec61e76dc56149713eea7f66367e6ca14dffe23a6021a0b924a36b336

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\8EEZHGIV.cookie
    MD5

    46c60b915c7e3442166a3ff0ce82f823

    SHA1

    738d492ee64fd571dd06a5294bfc3b3551712226

    SHA256

    dacdd48d826428d39e5571cadee7b8cf1e05f2cdd5a568d1f8ac1557ce876b34

    SHA512

    32c41f9abb1606671ba87da7253dd8897b15a84ea3933e310369a0481d8292739f9b6ed148898b165737d40736f442c046b7511cce5a598f3898a9c18fa16969

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\A7YIRBSA.cookie
    MD5

    b7792182c78acc43ab4d59e4b214498a

    SHA1

    c17ac46819960d9dc6638a9d89e847f6283d553a

    SHA256

    b4b0bc2d2b538c4c239553285b92ead75a97ba0d566451dce3b90e5788785e24

    SHA512

    5e950d81e4fefc53c6dc5eb6b561e01c4857d977577a1ee57a7ff11a7f8484d690dcc5d87d647bbde9903b741a5d40185b5c4ca5e039b4d43e5ff771f4239fa8

  • memory/1300-140-0x0000000000000000-mapping.dmp
  • memory/2704-145-0x00007FFDC41D0000-0x00007FFDC423B000-memory.dmp
    Filesize

    428KB

  • memory/2704-164-0x00007FFDC41D0000-0x00007FFDC423B000-memory.dmp
    Filesize

    428KB

  • memory/2704-131-0x00007FFDC41D0000-0x00007FFDC423B000-memory.dmp
    Filesize

    428KB

  • memory/2704-132-0x00007FFDC41D0000-0x00007FFDC423B000-memory.dmp
    Filesize

    428KB

  • memory/2704-134-0x00007FFDC41D0000-0x00007FFDC423B000-memory.dmp
    Filesize

    428KB

  • memory/2704-135-0x00007FFDC41D0000-0x00007FFDC423B000-memory.dmp
    Filesize

    428KB

  • memory/2704-136-0x00007FFDC41D0000-0x00007FFDC423B000-memory.dmp
    Filesize

    428KB

  • memory/2704-137-0x00007FFDC41D0000-0x00007FFDC423B000-memory.dmp
    Filesize

    428KB

  • memory/2704-138-0x00007FFDC41D0000-0x00007FFDC423B000-memory.dmp
    Filesize

    428KB

  • memory/2704-141-0x00007FFDC41D0000-0x00007FFDC423B000-memory.dmp
    Filesize

    428KB

  • memory/2704-142-0x00007FFDC41D0000-0x00007FFDC423B000-memory.dmp
    Filesize

    428KB

  • memory/2704-144-0x00007FFDC41D0000-0x00007FFDC423B000-memory.dmp
    Filesize

    428KB

  • memory/2704-129-0x00007FFDC41D0000-0x00007FFDC423B000-memory.dmp
    Filesize

    428KB

  • memory/2704-147-0x00007FFDC41D0000-0x00007FFDC423B000-memory.dmp
    Filesize

    428KB

  • memory/2704-149-0x00007FFDC41D0000-0x00007FFDC423B000-memory.dmp
    Filesize

    428KB

  • memory/2704-150-0x00007FFDC41D0000-0x00007FFDC423B000-memory.dmp
    Filesize

    428KB

  • memory/2704-151-0x00007FFDC41D0000-0x00007FFDC423B000-memory.dmp
    Filesize

    428KB

  • memory/2704-155-0x00007FFDC41D0000-0x00007FFDC423B000-memory.dmp
    Filesize

    428KB

  • memory/2704-156-0x00007FFDC41D0000-0x00007FFDC423B000-memory.dmp
    Filesize

    428KB

  • memory/2704-157-0x00007FFDC41D0000-0x00007FFDC423B000-memory.dmp
    Filesize

    428KB

  • memory/2704-163-0x00007FFDC41D0000-0x00007FFDC423B000-memory.dmp
    Filesize

    428KB

  • memory/2704-128-0x00007FFDC41D0000-0x00007FFDC423B000-memory.dmp
    Filesize

    428KB

  • memory/2704-165-0x00007FFDC41D0000-0x00007FFDC423B000-memory.dmp
    Filesize

    428KB

  • memory/2704-166-0x00007FFDC41D0000-0x00007FFDC423B000-memory.dmp
    Filesize

    428KB

  • memory/2704-167-0x00007FFDC41D0000-0x00007FFDC423B000-memory.dmp
    Filesize

    428KB

  • memory/2704-168-0x00007FFDC41D0000-0x00007FFDC423B000-memory.dmp
    Filesize

    428KB

  • memory/2704-169-0x00007FFDC41D0000-0x00007FFDC423B000-memory.dmp
    Filesize

    428KB

  • memory/2704-173-0x00007FFDC41D0000-0x00007FFDC423B000-memory.dmp
    Filesize

    428KB

  • memory/2704-127-0x00007FFDC41D0000-0x00007FFDC423B000-memory.dmp
    Filesize

    428KB

  • memory/2704-125-0x00007FFDC41D0000-0x00007FFDC423B000-memory.dmp
    Filesize

    428KB

  • memory/2704-124-0x00007FFDC41D0000-0x00007FFDC423B000-memory.dmp
    Filesize

    428KB

  • memory/2704-123-0x00007FFDC41D0000-0x00007FFDC423B000-memory.dmp
    Filesize

    428KB

  • memory/2704-122-0x00007FFDC41D0000-0x00007FFDC423B000-memory.dmp
    Filesize

    428KB

  • memory/2704-121-0x00007FFDC41D0000-0x00007FFDC423B000-memory.dmp
    Filesize

    428KB

  • memory/2704-120-0x00007FFDC41D0000-0x00007FFDC423B000-memory.dmp
    Filesize

    428KB

  • memory/2704-119-0x00007FFDC41D0000-0x00007FFDC423B000-memory.dmp
    Filesize

    428KB

  • memory/2704-117-0x00007FFDC41D0000-0x00007FFDC423B000-memory.dmp
    Filesize

    428KB

  • memory/2704-116-0x00007FFDC41D0000-0x00007FFDC423B000-memory.dmp
    Filesize

    428KB

  • memory/2704-115-0x00007FFDC41D0000-0x00007FFDC423B000-memory.dmp
    Filesize

    428KB

  • memory/2704-174-0x00007FFDC41D0000-0x00007FFDC423B000-memory.dmp
    Filesize

    428KB

  • memory/2704-177-0x00007FFDC41D0000-0x00007FFDC423B000-memory.dmp
    Filesize

    428KB

  • memory/2704-178-0x00007FFDC41D0000-0x00007FFDC423B000-memory.dmp
    Filesize

    428KB

  • memory/2704-179-0x00007FFDC41D0000-0x00007FFDC423B000-memory.dmp
    Filesize

    428KB