Analysis

  • max time kernel
    146s
  • max time network
    148s
  • platform
    windows10_x64
  • resource
    win10-en-20211104
  • submitted
    05-11-2021 13:39

General

  • Target

    https://r.email.knowliom.com/mk/un/v2/eF0wFvedOSTBIE9-ybE1psRePr3T8TIIOuOn8w07m2QCmJBmnlPnAw5EpKxRYRfrsdt1fDSaFepbWprDfQOYpyORMVd8XzoFqIVZjGS6N54O8pNvjdQyjpfGSTjLs2N2NDGxKOrRFevFCa1eRC-LXGkLb6ZPaAFbRb0bxJ0RHA', 'https://r.email.knowliom.com/mk/op/4FMRwEC1hOqecwinSZl0nKa6XwBc-VBqp6vGOVo4nH8XlQ0Tr8q1RjZsSaReLDbsAdO3nI7UfBQGme0v29b1llHIOCyWLKADILz4fLoWswXl36bHs4_Cmv8ByiaxLg-Wn58Nw34

Score
5/10

Malware Config

Signatures

  • Detected potential entity reuse from brand google.
  • Modifies Internet Explorer settings 1 TTPs 63 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" "https://r.email.knowliom.com/mk/un/v2/eF0wFvedOSTBIE9-ybE1psRePr3T8TIIOuOn8w07m2QCmJBmnlPnAw5EpKxRYRfrsdt1fDSaFepbWprDfQOYpyORMVd8XzoFqIVZjGS6N54O8pNvjdQyjpfGSTjLs2N2NDGxKOrRFevFCa1eRC-LXGkLb6ZPaAFbRb0bxJ0RHA', 'https://r.email.knowliom.com/mk/op/4FMRwEC1hOqecwinSZl0nKa6XwBc-VBqp6vGOVo4nH8XlQ0Tr8q1RjZsSaReLDbsAdO3nI7UfBQGme0v29b1llHIOCyWLKADILz4fLoWswXl36bHs4_Cmv8ByiaxLg-Wn58Nw34"
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4260
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4260 CREDAT:82945 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1940
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4260 CREDAT:214019 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1892

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
    MD5

    c2dd7acf915d95fc4e709fe8d42a82d1

    SHA1

    1896654cd15a5de8208f79f91443b02619890d40

    SHA256

    0e1f740fbe77cc5b7cadcb44a1d8cb24df7e6be081df3ae0659687c5ec0b019b

    SHA512

    94ec53de99c8e2200d2b10e4379642a180adb7e2e8006fd2bfb00b8b347c7667912d297cf4b26a43730b3449c61d5c236fa1aa50d5c55c9a45e14d7a01adc88d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\265C0DEB29181DD1891051371C5F863A_6BDEE7513D81379EEA43EF5811CD0E75
    MD5

    7dded4972fbd4373909ae945674793b0

    SHA1

    e44f6bbedfd0cd2842d44b48a11aa476abaf8ab7

    SHA256

    c8af8f9e4cd14789549dd0d6ebd6307e13161150f58515d05e6e8593e9a7a5bf

    SHA512

    0c19f8cfba1a72d6c32efdc9174cae3ab6c9b33ed6b8806b0c9f558a491ab7175ab9863e1a5fadf51c55ff539b36704cf02c8235f22ba4eb28f8a98be9c76451

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\646C991C2A28825F3CC56E0A1D1E3FA9
    MD5

    29beadbcc2cd6b5640654c669e7da221

    SHA1

    de3b32b85a2f5e94615bebe36a16ce51df85dfef

    SHA256

    8f7a1b65aa699833edbba97a9236fd8a6f6b234abeb3e21cc47d27053f47ed52

    SHA512

    591efbe05ae4e00f35a09a0055aba7dd8f62ef385ec7fe2f6ee38e1eff4c721ba49e34753960e4890b5d2593d7e8753256ad826bf4239a23649221d1d5d109de

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    MD5

    a46e27d1a674a729535408d54d78d4e6

    SHA1

    1ad0f6b6df35fcaf74aacb6195d93132d08ea74d

    SHA256

    c95ecbe6c10d85cb26ea3272fdc61301e5787f74c4b94fbf893116776ca81e48

    SHA512

    412d5ef57f201da817f15a7d7e091ca84a800934c7d33e83b878c363e70493b91119cd967b957099bb874c12ccc7879ce15f9ab81b813fd181d5d45e27b186b3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
    MD5

    64e9b8bb98e2303717538ce259bec57d

    SHA1

    2b07bf8e0d831da42760c54feff484635009c172

    SHA256

    76bd459ec8e467efc3e3fb94cb21b9c77a2aa73c9d4c0f3faf823677be756331

    SHA512

    8980af4a87a009f1ae165182d1edd4ccbd12b40a5890de5dbaea4dbf3aeb86edffd58b088b1e35e12d6b1197cc0db658a9392283583b3cb24a516ebc1f736c56

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F2DDCD2B5F37625B82E81F4976CEE400_7B2910F55D52F3446D0A6F1EDB226590
    MD5

    d9ab8cad210c15d635511f886ae49b3e

    SHA1

    064d26d6702bf096fe170e21f32d19f0176646d4

    SHA256

    6ac03fc6503a4d1d72169427a158836b9c3a3d4504785d85c4fc960f4c330f82

    SHA512

    8c12f6d924987b0172b205ce06ee240d2f10326d46bfcd42f8dadaaa5873c77f07035112ce3e9d6ff7aaadf75d3e48982cdb09ab3f628dead304b7568cf33c7f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
    MD5

    0707e45a758e5ca8cfcc3dcda3661bff

    SHA1

    a466c7e8883cabdb505132fbd3677a98eceff90e

    SHA256

    2aa208293ee3c0fa384b551d33bbab8653bbf7c834ab8330d25dbe4a573488ef

    SHA512

    0bdb0423036b0262df8a160b4a7529d5caa4182ac383fbea10eb2c51e42543109b0e717d73f4773c1bf35c0f7b1caf216462fa0747f24221f26f797bc38e1923

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\265C0DEB29181DD1891051371C5F863A_6BDEE7513D81379EEA43EF5811CD0E75
    MD5

    fd99c6d4d4787e4a2b81f518c8ffd65e

    SHA1

    6417029c2f1acb93708b89bab9fdef41988cd0b8

    SHA256

    615482b7a81046de3044156f7840601a12a8cdf47891d1928eaeb42d27228f09

    SHA512

    ebce4019b5985279525fafe28d55d0b05dde45997cee0424d2552865419ef79f71ba704147dcbbf6e949f4f8aa210487ac29a5789ca66e3146ca1aa852f35b65

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\646C991C2A28825F3CC56E0A1D1E3FA9
    MD5

    e122273b466122f4ad4d98fc1dab8b6f

    SHA1

    0388e93ef4016d19f3184e1aa6d166355c33fcaf

    SHA256

    fb5dff2df7041f5a563bc74a03a22fb0c2919b780f89b971275778b6efbc0554

    SHA512

    d97a9dd45b002f0b6a65833b92354c57e1d96f59390585d4a915b63f4ea4ab5f6c52261c58d9720ec6cf4d4f40487fb16319bb6a180aeca1ad1d741348c5623a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    MD5

    6bed9cff8cc398142e9e0bdd25b5d217

    SHA1

    6d14371f84d3b20dea41b8f8d329b638c394b4c5

    SHA256

    06d6c0102262bae356f172fb59fb50722ecbadb3afc8cbc37429f0ccbbff7dee

    SHA512

    42fb7f90c6700f6d752d5d43a59cbe3dbdc0f3d0254b6b3bb891d44a745877a358fb6088e1414d312994fd80a04c05688b8c48bf55621b47a569192477fe5589

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
    MD5

    1c58e672679722205aa147fd72b07fc8

    SHA1

    67708b19e20812068732fb03b6b971535dd0e564

    SHA256

    0cb9eee4a4b78369049a96c1796cd7a1bc049e89bad481fe7af12e4efca28f49

    SHA512

    caad31094c08881f56a5eff33069fa5effd891deb0cfc63f9b8b793501f1302b49139725f17cbdc4073c8237ac9ce078b382e2a282bb5dc8228b15e29fc92807

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F2DDCD2B5F37625B82E81F4976CEE400_7B2910F55D52F3446D0A6F1EDB226590
    MD5

    5b9bb568f25bf933a0fdb7ba49a2a0bc

    SHA1

    c7bb6ccaee4053d7494b796871f6f03c77609529

    SHA256

    38f0cd185f3c2869b68aa24f7461101982838ae73d751f9f0a8f707aa12eb572

    SHA512

    a070321992f4452b0ab3c627e74da14e5d087cb5d9c0eba4eafe43e2c036a28a7300f4e011f10fa280a216878c3d7d0a9d8642b4acf2a2c474cf3513c2506f4d

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\LOEA0KPG\6283888[1].htm
    MD5

    cec91b59dc6ef5adb0c45a056b6a648b

    SHA1

    1d406526760e739fa8d3d8cff3d4b32901078ff4

    SHA256

    a22940ded481a6f77872a07323df321e5385305e70fa2d11465af1e92b9353c8

    SHA512

    e1336fd3ff3623081314875a48bfda51177bcaaa201ab2a524adc576e4c846ca8b25ae84455dedb55ac4209938693c3e5ca9fa95fcd37e95815df665a94fedb2

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\1GGS0IMW.cookie
    MD5

    f8901ea161b68b2b2fc3ed592a1ab727

    SHA1

    6425110aa33d8800c673af4e001959e84be84927

    SHA256

    19aa4ff7bdf84a86ea526904b345a598af3e1649c1b1d67819ac3b81da67a56b

    SHA512

    704a19a838b795bf9b7d57db59d6aba047f87cefc1be27cffc7d8f0d4b3f49a9d4e869396cbe2cd2099edcfc0e51f6f73e46018b2c4c92bbabcee00c1ca36253

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\HYNCOFOU.cookie
    MD5

    d57a84eca30a400815c510fc40841639

    SHA1

    cf78bbfe4db30df7fe39398afac60d0013bdc688

    SHA256

    b96ad76301987c97f24cd72d377fcba4d2232ffee9863288e02bf77d2ab4f895

    SHA512

    6a9e9308d8c220953f51ed3539ebaf56a5fcde3828d18afc74d6a198cd25b8927d010f6d1f09420941f3ae34c95bc0981fe7dc4ec4db90b9e91996296ca47955

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\V4S01CC3.cookie
    MD5

    c819d4b7681d3b1d965c7ffbfe9a7706

    SHA1

    26ee780b1e6ca04b6cc88a1472403158ce825871

    SHA256

    42e6b13220428fd978a01557edd057754c5deb779f56db4c2673b365b71385b7

    SHA512

    13bea331af1109be8f5e492247f0f696048b888c3aa8f07b3abbcfc98f7209bab57bb9754e638670133cfc6b4c2d6eae0cc067146301bf337959b575d7aba628

  • memory/1892-189-0x0000000000000000-mapping.dmp
  • memory/1940-143-0x0000000000000000-mapping.dmp
  • memory/4260-136-0x00007FFAAE400000-0x00007FFAAE46B000-memory.dmp
    Filesize

    428KB

  • memory/4260-176-0x00007FFAAE400000-0x00007FFAAE46B000-memory.dmp
    Filesize

    428KB

  • memory/4260-140-0x00007FFAAE400000-0x00007FFAAE46B000-memory.dmp
    Filesize

    428KB

  • memory/4260-145-0x00007FFAAE400000-0x00007FFAAE46B000-memory.dmp
    Filesize

    428KB

  • memory/4260-144-0x00007FFAAE400000-0x00007FFAAE46B000-memory.dmp
    Filesize

    428KB

  • memory/4260-148-0x00007FFAAE400000-0x00007FFAAE46B000-memory.dmp
    Filesize

    428KB

  • memory/4260-147-0x00007FFAAE400000-0x00007FFAAE46B000-memory.dmp
    Filesize

    428KB

  • memory/4260-150-0x00007FFAAE400000-0x00007FFAAE46B000-memory.dmp
    Filesize

    428KB

  • memory/4260-152-0x00007FFAAE400000-0x00007FFAAE46B000-memory.dmp
    Filesize

    428KB

  • memory/4260-153-0x00007FFAAE400000-0x00007FFAAE46B000-memory.dmp
    Filesize

    428KB

  • memory/4260-154-0x00007FFAAE400000-0x00007FFAAE46B000-memory.dmp
    Filesize

    428KB

  • memory/4260-158-0x00007FFAAE400000-0x00007FFAAE46B000-memory.dmp
    Filesize

    428KB

  • memory/4260-159-0x00007FFAAE400000-0x00007FFAAE46B000-memory.dmp
    Filesize

    428KB

  • memory/4260-160-0x00007FFAAE400000-0x00007FFAAE46B000-memory.dmp
    Filesize

    428KB

  • memory/4260-166-0x00007FFAAE400000-0x00007FFAAE46B000-memory.dmp
    Filesize

    428KB

  • memory/4260-167-0x00007FFAAE400000-0x00007FFAAE46B000-memory.dmp
    Filesize

    428KB

  • memory/4260-168-0x00007FFAAE400000-0x00007FFAAE46B000-memory.dmp
    Filesize

    428KB

  • memory/4260-169-0x00007FFAAE400000-0x00007FFAAE46B000-memory.dmp
    Filesize

    428KB

  • memory/4260-170-0x00007FFAAE400000-0x00007FFAAE46B000-memory.dmp
    Filesize

    428KB

  • memory/4260-171-0x00007FFAAE400000-0x00007FFAAE46B000-memory.dmp
    Filesize

    428KB

  • memory/4260-172-0x00007FFAAE400000-0x00007FFAAE46B000-memory.dmp
    Filesize

    428KB

  • memory/4260-141-0x00007FFAAE400000-0x00007FFAAE46B000-memory.dmp
    Filesize

    428KB

  • memory/4260-177-0x00007FFAAE400000-0x00007FFAAE46B000-memory.dmp
    Filesize

    428KB

  • memory/4260-180-0x00007FFAAE400000-0x00007FFAAE46B000-memory.dmp
    Filesize

    428KB

  • memory/4260-181-0x00007FFAAE400000-0x00007FFAAE46B000-memory.dmp
    Filesize

    428KB

  • memory/4260-182-0x00007FFAAE400000-0x00007FFAAE46B000-memory.dmp
    Filesize

    428KB

  • memory/4260-139-0x00007FFAAE400000-0x00007FFAAE46B000-memory.dmp
    Filesize

    428KB

  • memory/4260-138-0x00007FFAAE400000-0x00007FFAAE46B000-memory.dmp
    Filesize

    428KB

  • memory/4260-118-0x00007FFAAE400000-0x00007FFAAE46B000-memory.dmp
    Filesize

    428KB

  • memory/4260-135-0x00007FFAAE400000-0x00007FFAAE46B000-memory.dmp
    Filesize

    428KB

  • memory/4260-134-0x00007FFAAE400000-0x00007FFAAE46B000-memory.dmp
    Filesize

    428KB

  • memory/4260-132-0x00007FFAAE400000-0x00007FFAAE46B000-memory.dmp
    Filesize

    428KB

  • memory/4260-131-0x00007FFAAE400000-0x00007FFAAE46B000-memory.dmp
    Filesize

    428KB

  • memory/4260-130-0x00007FFAAE400000-0x00007FFAAE46B000-memory.dmp
    Filesize

    428KB

  • memory/4260-128-0x00007FFAAE400000-0x00007FFAAE46B000-memory.dmp
    Filesize

    428KB

  • memory/4260-127-0x00007FFAAE400000-0x00007FFAAE46B000-memory.dmp
    Filesize

    428KB

  • memory/4260-126-0x00007FFAAE400000-0x00007FFAAE46B000-memory.dmp
    Filesize

    428KB

  • memory/4260-125-0x00007FFAAE400000-0x00007FFAAE46B000-memory.dmp
    Filesize

    428KB

  • memory/4260-124-0x00007FFAAE400000-0x00007FFAAE46B000-memory.dmp
    Filesize

    428KB

  • memory/4260-123-0x00007FFAAE400000-0x00007FFAAE46B000-memory.dmp
    Filesize

    428KB

  • memory/4260-122-0x00007FFAAE400000-0x00007FFAAE46B000-memory.dmp
    Filesize

    428KB

  • memory/4260-120-0x00007FFAAE400000-0x00007FFAAE46B000-memory.dmp
    Filesize

    428KB

  • memory/4260-119-0x00007FFAAE400000-0x00007FFAAE46B000-memory.dmp
    Filesize

    428KB