Overview
overview
10Static
static
URLScan
urlscan
https://nawa-store.c...
windows7_x64
6https://nawa-store.c...
windows7_x64
1https://nawa-store.c...
windows7_x64
6https://nawa-store.c...
windows11_x64
8https://nawa-store.c...
windows10_x64
10https://nawa-store.c...
windows10_x64
10https://nawa-store.c...
windows10_x64
10Analysis
-
max time kernel
119s -
max time network
141s -
platform
windows7_x64 -
resource
win7-en-20211014 -
submitted
01-12-2021 00:09
Static task
static1
URLScan task
urlscan1
Sample
https://nawa-store.com/shopinside
Behavioral task
behavioral1
Sample
https://nawa-store.com/shopinside
Resource
win7-ja-20211104
Behavioral task
behavioral2
Sample
https://nawa-store.com/shopinside
Resource
win7-en-20211014
Behavioral task
behavioral3
Sample
https://nawa-store.com/shopinside
Resource
win7-de-20211104
Behavioral task
behavioral4
Sample
https://nawa-store.com/shopinside
Resource
win11
Behavioral task
behavioral5
Sample
https://nawa-store.com/shopinside
Resource
win10-ja-20211014
Behavioral task
behavioral6
Sample
https://nawa-store.com/shopinside
Resource
win10-en-20211104
Behavioral task
behavioral7
Sample
https://nawa-store.com/shopinside
Resource
win10-de-20211014
General
-
Target
https://nawa-store.com/shopinside
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEIEXPLORE.EXEIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "345086170" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D6D647C1-5243-11EC-BFD7-6E82E447E8A6} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1120 iexplore.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
Processes:
iexplore.exeIEXPLORE.EXEIEXPLORE.EXEIEXPLORE.EXEpid process 1120 iexplore.exe 1120 iexplore.exe 1228 IEXPLORE.EXE 1228 IEXPLORE.EXE 1740 IEXPLORE.EXE 1740 IEXPLORE.EXE 916 IEXPLORE.EXE 916 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
iexplore.exedescription pid process target process PID 1120 wrote to memory of 1228 1120 iexplore.exe IEXPLORE.EXE PID 1120 wrote to memory of 1228 1120 iexplore.exe IEXPLORE.EXE PID 1120 wrote to memory of 1228 1120 iexplore.exe IEXPLORE.EXE PID 1120 wrote to memory of 1228 1120 iexplore.exe IEXPLORE.EXE PID 1120 wrote to memory of 916 1120 iexplore.exe IEXPLORE.EXE PID 1120 wrote to memory of 916 1120 iexplore.exe IEXPLORE.EXE PID 1120 wrote to memory of 916 1120 iexplore.exe IEXPLORE.EXE PID 1120 wrote to memory of 916 1120 iexplore.exe IEXPLORE.EXE PID 1120 wrote to memory of 1740 1120 iexplore.exe IEXPLORE.EXE PID 1120 wrote to memory of 1740 1120 iexplore.exe IEXPLORE.EXE PID 1120 wrote to memory of 1740 1120 iexplore.exe IEXPLORE.EXE PID 1120 wrote to memory of 1740 1120 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://nawa-store.com/shopinside1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1120 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1120 CREDAT:340994 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1120 CREDAT:209934 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015MD5
acaeda60c79c6bcac925eeb3653f45e0
SHA12aaae490bcdaccc6172240ff1697753b37ac5578
SHA2566b0ceccf0103afd89844761417c1d23acc41f8aebf3b7230765209b61eee5658
SHA512feaa6e7ed7dda1583739b3e531ab5c562a222ee6ecd042690ae7dcff966717c6e968469a7797265a11f6e899479ae0f3031e8cf5bebe1492d5205e9c59690900
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015MD5
52f7f4f8c013d375f9a7d7eaa99fe8ee
SHA1054f1dba3421e4ce93d4a2d138d22f33a54b5e5f
SHA2568c12f30f3c64d9ecd295691efa4be0dcae86f85e314f59f11634be1bd98702fb
SHA51249780a58f23e28ed0ab4e79dde961a15aafecc09aa3a978a156bad511721a167a7b504948eabd522b39d3107394f1872bc84f7fe69a287376306de7d55e2a8c3
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\RHI8KPQK\SSWU79U1.htmMD5
4795408722c856d480dcf76c8d5f6e37
SHA112d512f5b3b0ed22bbb0509b3458fcee5254ed39
SHA25691556f3bfb4af6a4bf310b42d9967a52cbe1992b4f0536df63e60563c6db4875
SHA5121f2c566107080047fb2a88fe9bc53567ed7dbf1f47d8105e854fe994227a756a346a3b46e8bcce4f561ce93bfedd8b9acb8e3ff518b5cc9b027f073cc03f3c88
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\586YT70K.txtMD5
4a98eb703c391adc5c8261006064cfe0
SHA11e56c06a26884efcde7514b2ab3d7f233959587f
SHA2566c610bdd41e44d1aade9955aa81ecaa9e240ddde00970df0510a85cdf01ce13b
SHA512bca058da375fd25d3f4e1faa246f14a05116d84f6719ed6f790046809a88553fe4ea72341b69c5e23943267aff3d268c33def05f002f5f6a882abfd22b79d7e1
-
memory/916-57-0x0000000000000000-mapping.dmp
-
memory/1120-55-0x000007FEFC1F1000-0x000007FEFC1F3000-memory.dmpFilesize
8KB
-
memory/1228-56-0x0000000000000000-mapping.dmp
-
memory/1740-58-0x0000000000000000-mapping.dmp