Analysis

  • max time kernel
    133s
  • max time network
    144s
  • platform
    windows10_x64
  • resource
    win10-en-20211014
  • submitted
    09-11-2021 14:03

General

  • Target

    https://go.skimresources.com/?xs=1&sref=https%3A%2F%2Fwww.techadvisor.co.uk%2Fnew-product%2Fmobile-phone%2Foneplus-7-3696717%2F&url=https%3A%2F%2Fmail-orefid-login.website%E2%80%8B.yandexcloud.net%[email protected]

Score
5/10

Malware Config

Signatures

  • Detected potential entity reuse from brand microsoft.
  • Modifies Internet Explorer settings 1 TTPs 49 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://go.skimresources.com/?xs=1&sref=https%3A%2F%2Fwww.techadvisor.co.uk%2Fnew-product%2Fmobile-phone%2Foneplus-7-3696717%2F&url=https%3A%2F%2Fmail-orefid-login.website%E2%80%8B.yandexcloud.net%[email protected]
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2724
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2724 CREDAT:82945 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:592

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\5080DC7A65DB6A5960ECD874088F3328_862BA1770B2FEE013603D2FF9ABEAFDA
    MD5

    71d8a38cf7ea770a0c84ee9fc1e2417e

    SHA1

    e167f8b1b80fe4b43ea0d8b0136f8f2a515cfb8b

    SHA256

    612925652d08589cd06853d56a03e6a5795499041269c869ed81f1ee2da7a64d

    SHA512

    6c85ee1893f42be20f317c42a2e42421c9e2e8fc51bea019a88453e3f7c4db566a3d16cd533a755fca893a337265e97e53d0c1bd885ba9a4253ab217a5fdc772

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    MD5

    1c3ed22c003b0e1724a802f750244f60

    SHA1

    c83f95230ea4d3ac58c4f5d5a7504b0f5eedf0ad

    SHA256

    f24de6edda835df45daadcce85ecfeaa1f5a363a16faeff1c16ae55ec57dcb6b

    SHA512

    7f9f0395307b63d4bda636b132533f5e62b36bfa78ff0850c5ba0a2ebe3f426b0a18232993a35bfe9166d9f86d2dfe2ad6429fc864265a0bdf6d4f1f25d26297

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_2DBE917624E9880FE0C7C5570D56E691
    MD5

    271a15791257ca250f0a077f3a537738

    SHA1

    c06016237a3531f8a06c0003c30763c6582bde3a

    SHA256

    12da708bbde0f3ac26ecfcb50afbb0a0b0c7021493b8348207583a39c703db64

    SHA512

    5bf5df287ab60c5135f79c76839eb2b8db18d72cd236009837c4af05a042cc5d1cdd7dcb32a206b2ea1e2540df588a8eed01157a3fd38e2f2f0a7b81d5ddf47d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\5080DC7A65DB6A5960ECD874088F3328_862BA1770B2FEE013603D2FF9ABEAFDA
    MD5

    bba288746648bc2f27b1d2fe6274d85f

    SHA1

    0c96c2d9671b0f70229fffe0b0fd2c8bb73f3bfb

    SHA256

    d28de21e915452c0b15c8c960238098de804ef44e7801287645481c22b0b598e

    SHA512

    eb6aaf8f858a8fbaec2eede327e086d2ba3c6ecca5070a40b31e1519eda74d2bf1a59a71c6b739dd89af46bf153134deb56e926964d0476fe14db85404fa770f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    MD5

    3900d87730fc2279a46fcaa6e441ae70

    SHA1

    fa409b71f090aabc06077a0889c01e0415315567

    SHA256

    7301fe9536e56ec81e106998898ae6c21d88e5146f90598f57f67f6114091cc8

    SHA512

    c00f5e9f364063a1a3d4190ee2d5bbeaa983e4284e10b8c670c033a77bf26383be3aed064512fabb3f6f49c9749b1ea5882835e6174aa816f0880f62ac061992

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_2DBE917624E9880FE0C7C5570D56E691
    MD5

    07e34344c014db51f99235094c87cd3c

    SHA1

    6bde464e045bd387f01ea0f9cbde4162c25f3f24

    SHA256

    344083ac00377739190f88b3d5f0ecfd2530a45e05098d585be5d2c974570ce9

    SHA512

    86f2707635bc85de82e2313174aa0ce85b80c5908003012fe8d48b79755bd826f530ef7660215ccb0bcb7c642f0ceaee36896f992d777eaf9b1a8de8cd54b8cf

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\U9XYPOGL.cookie
    MD5

    0c9e9ef94c0043b3d5615323560518a5

    SHA1

    c8b95483044a1a94e4f6e684f16978984f632444

    SHA256

    2663a8bfd0bf464926ceed2a44a9b510bdd9e64977eae21335407784ec99e796

    SHA512

    0ac26a480e776d1aff66b1dc0e529248d36920531d1981604bf0b3dce26dc412f971b839ba7a550ac3ff3f0d6bbe606b5b21420950589d879e39a02c55fb4511

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\VWLW0FBH.cookie
    MD5

    a6dbeffd39c52df69da227c585de656d

    SHA1

    6f52058ec06a276c580ef7a94bf2f670b29f2478

    SHA256

    ae52e21ed8cdc6b2e99265426cadb04ed13ad51302bb8c3cc9fc1a624f1c5af1

    SHA512

    5a4438e2855013559f0015948a41c47925fb796ae166fe625b7efb76dff3432596075e73bf751d607bc7800ba75874c14e22ce11678e9a70ebb2512498c9f481

  • memory/592-140-0x0000000000000000-mapping.dmp
  • memory/2724-138-0x00007FFDC41D0000-0x00007FFDC423B000-memory.dmp
    Filesize

    428KB

  • memory/2724-149-0x00007FFDC41D0000-0x00007FFDC423B000-memory.dmp
    Filesize

    428KB

  • memory/2724-122-0x00007FFDC41D0000-0x00007FFDC423B000-memory.dmp
    Filesize

    428KB

  • memory/2724-123-0x00007FFDC41D0000-0x00007FFDC423B000-memory.dmp
    Filesize

    428KB

  • memory/2724-125-0x00007FFDC41D0000-0x00007FFDC423B000-memory.dmp
    Filesize

    428KB

  • memory/2724-124-0x00007FFDC41D0000-0x00007FFDC423B000-memory.dmp
    Filesize

    428KB

  • memory/2724-127-0x00007FFDC41D0000-0x00007FFDC423B000-memory.dmp
    Filesize

    428KB

  • memory/2724-128-0x00007FFDC41D0000-0x00007FFDC423B000-memory.dmp
    Filesize

    428KB

  • memory/2724-129-0x00007FFDC41D0000-0x00007FFDC423B000-memory.dmp
    Filesize

    428KB

  • memory/2724-131-0x00007FFDC41D0000-0x00007FFDC423B000-memory.dmp
    Filesize

    428KB

  • memory/2724-132-0x00007FFDC41D0000-0x00007FFDC423B000-memory.dmp
    Filesize

    428KB

  • memory/2724-134-0x00007FFDC41D0000-0x00007FFDC423B000-memory.dmp
    Filesize

    428KB

  • memory/2724-135-0x00007FFDC41D0000-0x00007FFDC423B000-memory.dmp
    Filesize

    428KB

  • memory/2724-136-0x00007FFDC41D0000-0x00007FFDC423B000-memory.dmp
    Filesize

    428KB

  • memory/2724-137-0x00007FFDC41D0000-0x00007FFDC423B000-memory.dmp
    Filesize

    428KB

  • memory/2724-120-0x00007FFDC41D0000-0x00007FFDC423B000-memory.dmp
    Filesize

    428KB

  • memory/2724-141-0x00007FFDC41D0000-0x00007FFDC423B000-memory.dmp
    Filesize

    428KB

  • memory/2724-142-0x00007FFDC41D0000-0x00007FFDC423B000-memory.dmp
    Filesize

    428KB

  • memory/2724-144-0x00007FFDC41D0000-0x00007FFDC423B000-memory.dmp
    Filesize

    428KB

  • memory/2724-145-0x00007FFDC41D0000-0x00007FFDC423B000-memory.dmp
    Filesize

    428KB

  • memory/2724-147-0x00007FFDC41D0000-0x00007FFDC423B000-memory.dmp
    Filesize

    428KB

  • memory/2724-121-0x00007FFDC41D0000-0x00007FFDC423B000-memory.dmp
    Filesize

    428KB

  • memory/2724-150-0x00007FFDC41D0000-0x00007FFDC423B000-memory.dmp
    Filesize

    428KB

  • memory/2724-151-0x00007FFDC41D0000-0x00007FFDC423B000-memory.dmp
    Filesize

    428KB

  • memory/2724-155-0x00007FFDC41D0000-0x00007FFDC423B000-memory.dmp
    Filesize

    428KB

  • memory/2724-156-0x00007FFDC41D0000-0x00007FFDC423B000-memory.dmp
    Filesize

    428KB

  • memory/2724-157-0x00007FFDC41D0000-0x00007FFDC423B000-memory.dmp
    Filesize

    428KB

  • memory/2724-163-0x00007FFDC41D0000-0x00007FFDC423B000-memory.dmp
    Filesize

    428KB

  • memory/2724-164-0x00007FFDC41D0000-0x00007FFDC423B000-memory.dmp
    Filesize

    428KB

  • memory/2724-165-0x00007FFDC41D0000-0x00007FFDC423B000-memory.dmp
    Filesize

    428KB

  • memory/2724-166-0x00007FFDC41D0000-0x00007FFDC423B000-memory.dmp
    Filesize

    428KB

  • memory/2724-167-0x00007FFDC41D0000-0x00007FFDC423B000-memory.dmp
    Filesize

    428KB

  • memory/2724-168-0x00007FFDC41D0000-0x00007FFDC423B000-memory.dmp
    Filesize

    428KB

  • memory/2724-169-0x00007FFDC41D0000-0x00007FFDC423B000-memory.dmp
    Filesize

    428KB

  • memory/2724-119-0x00007FFDC41D0000-0x00007FFDC423B000-memory.dmp
    Filesize

    428KB

  • memory/2724-117-0x00007FFDC41D0000-0x00007FFDC423B000-memory.dmp
    Filesize

    428KB

  • memory/2724-116-0x00007FFDC41D0000-0x00007FFDC423B000-memory.dmp
    Filesize

    428KB

  • memory/2724-115-0x00007FFDC41D0000-0x00007FFDC423B000-memory.dmp
    Filesize

    428KB

  • memory/2724-173-0x00007FFDC41D0000-0x00007FFDC423B000-memory.dmp
    Filesize

    428KB

  • memory/2724-175-0x00007FFDC41D0000-0x00007FFDC423B000-memory.dmp
    Filesize

    428KB

  • memory/2724-178-0x00007FFDC41D0000-0x00007FFDC423B000-memory.dmp
    Filesize

    428KB

  • memory/2724-179-0x00007FFDC41D0000-0x00007FFDC423B000-memory.dmp
    Filesize

    428KB