Analysis

  • max time kernel
    152s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-ja-20211104
  • submitted
    01-12-2021 00:09

General

  • Target

    https://nawa-store.com/shopinside

Score
6/10

Malware Config

Signatures

  • Program crash 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 41 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 16 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://nawa-store.com/shopinside
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:984
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:984 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:636
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:984 CREDAT:340994 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1668
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1668 -s 1600
        3⤵
        • Program crash
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1704
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:984 CREDAT:668685 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1444
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:984 CREDAT:472095 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1760

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    MD5

    c9f0dbb882e2324c1269aaf86759e8e3

    SHA1

    bd2ac197e712f0c882d3dd3c5d9a1d32b8802534

    SHA256

    09d22633bcb8939583ff975e3c6d0cc7781b4f5cbd5dfd6ff7de0dd945c458e3

    SHA512

    daab7f4115a2c929c534e70f7702595406c9d6a62317fe8310922173e662e501d56446d3121f1715b0810f8985e97665051c09a995280eceff444a71154f5a82

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\EU9ERU9I\SSZCB9EY.htm
    MD5

    060af161d77526eedee89a5bc5931b45

    SHA1

    e3ea8ce6a1ccc6f290336fa05ff34426ad0a3675

    SHA256

    71cf2a28cf74812a0b34542816a164aa4d9e8e1476303703ab2abd5a428b172f

    SHA512

    4ad935498dddcc6212db7bc9d48dae70f1bcda8e2ce8db69fd3c7849551839f35a76f45eb40f15086097976efa7c666f0d519b8633a6d6e618e3706fbb459a47

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\H29VF4Q1\RDDGZMTC.htm
    MD5

    946f056ccc076510b6ba51ad5b6b7d7a

    SHA1

    2137e480d6f34d77e9e1d18647814f31c87fa6ce

    SHA256

    4beec60beed02eb24372d3b65d33c16c9427b22e0d89a5d782065f96da849eac

    SHA512

    47a219ecc263a1854dc40f2ec4c6561787e2578a5efdad31be3a0ad76a316ffc94b9d402ecf3c45ab9a0760cb4afc543eb1e653f73352295d06ad1ad5f7579bc

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\G47I9EZK.txt
    MD5

    f5cacbb23a4d7b7af39c9b5fada57ced

    SHA1

    de2c09094fe10d1cca14ec036a0702eb80bb4699

    SHA256

    2b9561491d5beb4cc7b754c7148ad460e874855ed7524ba20d051d2800f3cc4b

    SHA512

    1ae6c277963d28f1d99eff0503db5a0550ac06982bf6d9bc8ebc545b1aaa0ff8b519ab7efd164fc9f3a29b54ccf6aef9690803afd0966a49586a802a316ccd4f

  • memory/636-55-0x0000000000000000-mapping.dmp
  • memory/1444-61-0x0000000000000000-mapping.dmp
  • memory/1668-56-0x0000000000000000-mapping.dmp
  • memory/1704-58-0x0000000000000000-mapping.dmp
  • memory/1704-59-0x0000000002090000-0x0000000002154000-memory.dmp
    Filesize

    784KB

  • memory/1760-64-0x0000000000000000-mapping.dmp