Analysis

  • max time kernel
    148s
  • max time network
    146s
  • platform
    windows10_x64
  • resource
    win10-en-20211104
  • submitted
    06-11-2021 17:11

General

  • Target

    https://zpr.io/SLnbcjd3T7Gv

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 64 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://zpr.io/SLnbcjd3T7Gv
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3348
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3348 CREDAT:82945 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:3404

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\5B3BCDA4F252B606121609C103A3A1EE_635419839463C8DA5676767714DFEC1E
    MD5

    1c56a1df3d8e9988293eb427477e0c08

    SHA1

    6702cb6b097d2a309aa2686fad684b50ed1570a4

    SHA256

    586d99947d190e91e35432a191c5bc5ff0e9b6a5dc6bc1a21c400b071035efa4

    SHA512

    d4881e0fb142209c89252792e2f84b142c011f4aa4eee46fa6cc8a6b7570559e7bd76ef84c20fa4208b1911344928746adbeaba5f5ce492b39fe13e463073cf5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_A30EA9B4E1BC5DBF09A8EF399E086D27
    MD5

    ad2de74e56aa0e01a4743ff628ddc559

    SHA1

    72f7e004bd99711a73bf83aa570dfd41dc8658a9

    SHA256

    86390846cef09233d8b39ec95e166aeb291a851dd9137a8441608f2957b50769

    SHA512

    cc41c26131b4f917cbed3d27e36f0d1c42fe2fa1f52e4ee5738c62219980cb44133e9ce6f1745a2cf308b937bc5395c6ad0b57e8d53004a874ab8568a20e7af1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    MD5

    03322900fc771c0189375abaa76ecbb9

    SHA1

    f8d7a3947584c501e25b20848cd1f2204d842c17

    SHA256

    1c93f58700902b9c270d656d5c1b6cf4365efcf325b2bb4030adccec26ead56d

    SHA512

    30513247d1ecee892b9b11115bd07fd317510388601f4cc4f2860b1701bf188a03cd86506423a21abd3bf80c1b4f45dbdfead30b13a7a273d5ca79529194e530

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\5B3BCDA4F252B606121609C103A3A1EE_635419839463C8DA5676767714DFEC1E
    MD5

    80fda1c979898e8b84d0f052d0b1f45a

    SHA1

    e6391643ff35852b57534a549b6781bced2d28c6

    SHA256

    318d5f656c5d4804ab4bbaa51f61d12bd2e816de059bd1ad446c312fc4cfbb80

    SHA512

    cffe6ed278a260d3c9809635030ddc5aa71eaf841e93b71053a9946d4051a01a396e5e5a6a508ba941a2db38904bfa234116c87ea758e1bfb7803bc1939d3f26

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_A30EA9B4E1BC5DBF09A8EF399E086D27
    MD5

    8e2bedebfc310c93918fbac942350c13

    SHA1

    94a609075fdeedf593ac94433e7047dcb098fade

    SHA256

    a7cb8ee3bb3c9f53736d51e7a00076d8a967860c66e1e0e6aaca6c97dd468a8f

    SHA512

    c596779b6767406f0c6d0795bbe51190c7d685aecee3cbd92d9edcb7532cd352af984a3933cfac75acb2220440dab78b71435c886a3c4f24305eea6e857e58fd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    MD5

    72b072d397ee665af1bc5a4fd95734a5

    SHA1

    a7ab3da79bd19fa79a4dc0cb838d1fe0d69ccf3f

    SHA256

    d58012afd04e583f9d2049843503c7e7607d5d95d6172b1fb3330c12e0025d83

    SHA512

    3ef23fa015daac00675f9c50ec4ffece9e96a470d23dc5a5e09422e132e23ba9a086212009dab86b4dd54e81c44a703521615722839c4631d83a511c57103733

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\02DQJRR1.cookie
    MD5

    f5624ed4b478e87049427caeabbe820e

    SHA1

    a0fa5f7bc2bc6a417b27ee7619bb386816508a22

    SHA256

    5e652bd62302eef70f9ee31c14cfdb6163b2d2b4267f9fd39d9f9f38b825e17d

    SHA512

    ee85cc72836e4dca9edc3a32d35d875001b3ac3af8183fbfa5897c137a898b041e58d1ddd5cc7dfc7aedc5c0b115950e1877c0d15ef7bac206f6dd1423fa8e0c

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\SS1WI7W0.cookie
    MD5

    f15c65fa4884ed4fc00f42c4b7209b1f

    SHA1

    e06e7e7542761581cd7524eab6a44afd6dc03fd7

    SHA256

    9721227ca882dd12dcac92a95c883646a323ba81faf75b5f7de5f343f4ff5eef

    SHA512

    fc18a4c99cdeb8aceb36ab3f963f96ef87306a3b0165eb3e3f2ea18d227bcd586e707f85bbad6d48f8452c6a84e826685045a227abfb4bf1cc4271da0b942320

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\TGZ6DKNU.cookie
    MD5

    68b312cbc1e499332d3638994054ac6c

    SHA1

    f575590cf08f70a068bf7593635e28a141c5579b

    SHA256

    95870e6e2a442cf8adc8201ea7eeb9b70b5eb99d8d35ee15d3aa712e7e762b6d

    SHA512

    1c1ca5b9850ff84525536c7020d75e6021a868e99c8687be6f40c58699e8e51e7a20d83e0dffb6f0882efade3752154d6a9320d845b36c5224c59b28043b35a4

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\ZXX8SNPR.cookie
    MD5

    9854aae83a2f33a528824c069e02adc2

    SHA1

    d741b5fd83282ea8e74f4294bc89824c88ac5fd9

    SHA256

    b22ec4a0cc8d1c0772346280b03d26cb6a2e4225a6c83c9461f464249de00e1d

    SHA512

    8caebf9b68325d580205904fe2a00193b20f4d068fe5cb1f700e6798c82ea5ea97a94344142cc66da92c4918d1acb1d3b80ef0d001cf326ab85b5154d0a05dc4

  • memory/3348-147-0x00007FF82C500000-0x00007FF82C56B000-memory.dmp
    Filesize

    428KB

  • memory/3348-154-0x00007FF82C500000-0x00007FF82C56B000-memory.dmp
    Filesize

    428KB

  • memory/3348-127-0x00007FF82C500000-0x00007FF82C56B000-memory.dmp
    Filesize

    428KB

  • memory/3348-128-0x00007FF82C500000-0x00007FF82C56B000-memory.dmp
    Filesize

    428KB

  • memory/3348-130-0x00007FF82C500000-0x00007FF82C56B000-memory.dmp
    Filesize

    428KB

  • memory/3348-131-0x00007FF82C500000-0x00007FF82C56B000-memory.dmp
    Filesize

    428KB

  • memory/3348-132-0x00007FF82C500000-0x00007FF82C56B000-memory.dmp
    Filesize

    428KB

  • memory/3348-134-0x00007FF82C500000-0x00007FF82C56B000-memory.dmp
    Filesize

    428KB

  • memory/3348-136-0x00007FF82C500000-0x00007FF82C56B000-memory.dmp
    Filesize

    428KB

  • memory/3348-137-0x00007FF82C500000-0x00007FF82C56B000-memory.dmp
    Filesize

    428KB

  • memory/3348-138-0x00007FF82C500000-0x00007FF82C56B000-memory.dmp
    Filesize

    428KB

  • memory/3348-139-0x00007FF82C500000-0x00007FF82C56B000-memory.dmp
    Filesize

    428KB

  • memory/3348-140-0x00007FF82C500000-0x00007FF82C56B000-memory.dmp
    Filesize

    428KB

  • memory/3348-141-0x00007FF82C500000-0x00007FF82C56B000-memory.dmp
    Filesize

    428KB

  • memory/3348-144-0x00007FF82C500000-0x00007FF82C56B000-memory.dmp
    Filesize

    428KB

  • memory/3348-145-0x00007FF82C500000-0x00007FF82C56B000-memory.dmp
    Filesize

    428KB

  • memory/3348-126-0x00007FF82C500000-0x00007FF82C56B000-memory.dmp
    Filesize

    428KB

  • memory/3348-148-0x00007FF82C500000-0x00007FF82C56B000-memory.dmp
    Filesize

    428KB

  • memory/3348-150-0x00007FF82C500000-0x00007FF82C56B000-memory.dmp
    Filesize

    428KB

  • memory/3348-152-0x00007FF82C500000-0x00007FF82C56B000-memory.dmp
    Filesize

    428KB

  • memory/3348-153-0x00007FF82C500000-0x00007FF82C56B000-memory.dmp
    Filesize

    428KB

  • memory/3348-125-0x00007FF82C500000-0x00007FF82C56B000-memory.dmp
    Filesize

    428KB

  • memory/3348-158-0x00007FF82C500000-0x00007FF82C56B000-memory.dmp
    Filesize

    428KB

  • memory/3348-159-0x00007FF82C500000-0x00007FF82C56B000-memory.dmp
    Filesize

    428KB

  • memory/3348-160-0x00007FF82C500000-0x00007FF82C56B000-memory.dmp
    Filesize

    428KB

  • memory/3348-166-0x00007FF82C500000-0x00007FF82C56B000-memory.dmp
    Filesize

    428KB

  • memory/3348-167-0x00007FF82C500000-0x00007FF82C56B000-memory.dmp
    Filesize

    428KB

  • memory/3348-168-0x00007FF82C500000-0x00007FF82C56B000-memory.dmp
    Filesize

    428KB

  • memory/3348-169-0x00007FF82C500000-0x00007FF82C56B000-memory.dmp
    Filesize

    428KB

  • memory/3348-170-0x00007FF82C500000-0x00007FF82C56B000-memory.dmp
    Filesize

    428KB

  • memory/3348-171-0x00007FF82C500000-0x00007FF82C56B000-memory.dmp
    Filesize

    428KB

  • memory/3348-172-0x00007FF82C500000-0x00007FF82C56B000-memory.dmp
    Filesize

    428KB

  • memory/3348-176-0x00007FF82C500000-0x00007FF82C56B000-memory.dmp
    Filesize

    428KB

  • memory/3348-124-0x00007FF82C500000-0x00007FF82C56B000-memory.dmp
    Filesize

    428KB

  • memory/3348-123-0x00007FF82C500000-0x00007FF82C56B000-memory.dmp
    Filesize

    428KB

  • memory/3348-122-0x00007FF82C500000-0x00007FF82C56B000-memory.dmp
    Filesize

    428KB

  • memory/3348-120-0x00007FF82C500000-0x00007FF82C56B000-memory.dmp
    Filesize

    428KB

  • memory/3348-119-0x00007FF82C500000-0x00007FF82C56B000-memory.dmp
    Filesize

    428KB

  • memory/3348-118-0x00007FF82C500000-0x00007FF82C56B000-memory.dmp
    Filesize

    428KB

  • memory/3348-177-0x00007FF82C500000-0x00007FF82C56B000-memory.dmp
    Filesize

    428KB

  • memory/3348-180-0x00007FF82C500000-0x00007FF82C56B000-memory.dmp
    Filesize

    428KB

  • memory/3348-181-0x00007FF82C500000-0x00007FF82C56B000-memory.dmp
    Filesize

    428KB

  • memory/3348-182-0x00007FF82C500000-0x00007FF82C56B000-memory.dmp
    Filesize

    428KB

  • memory/3404-143-0x0000000000000000-mapping.dmp